In the present work, the focusing was on the study of the x-ray diffraction, dielectric constant, loses dielectric coefficient, tangent angle, alter- natively conductivity and morphology of PET/BaTio3. The PET/BaTio3 composite was prepared for polyethylene terephthalate PET polymer composite containing 0, 10, 20, 30, 40, 50, and 60 wt. % from Barium titanate BaTi03 powder. The composite of two materials leads to form mixing solution and hot-pressing method. The effect of BaTio3 on the structure and dielectric properties with morphology was studied on PET matrix polymer using XRD, LCR meter and SEM.
In this study the activities of alanine transaminase (ALT) and aspartate transaminase (AST) were evaluated, in addition to total protein and albumins in sera of sixty one subjects whose ages were ranged between(4-16) years. These subjects were, twenty eight major thalassemic patient (12 with splenectomy and 16 non splenectomy ) and fifteen with minor thalassemia. eighteen healty subjecte as control. The result revealed a significant elevation in the activities of both aminotransferases enzymes (AST and ALT) in the sera of all the alassmic patient groups compared with control. Also a significant increase in the activity of ALT in sera of non-splenectomy compared to splenectomy major thalassemic patient , which could be an indicative of th
... Show MoreCopulas are very efficient functions in the field of statistics and specially in statistical inference. They are fundamental tools in the study of dependence structures and deriving their properties. These reasons motivated us to examine and show various types of copula functions and their families. Also, we separately explain each method that is used to construct each copula in detail with different examples. There are various outcomes that show the copulas and their densities with respect to the joint distribution functions. The aim is to make copulas available to new researchers and readers who are interested in the modern phenomenon of statistical inferences.
Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreSeveral recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from th
... Show MoreAbstract:
The Iraqi economy faces complex economic challenges that threaten the prospects for growth and stability in the short and medium term, The decrease in oil revenues on which Iraq is based in financing its total expenditure, both operational and investment, led to the emergence of a deficit in the government budget, As the global oil price crisis affected the revenues of the Iraqi government negatively, especially as this negative impact coincided with the increase in military spending resulting from Iraq's war against terrorism, Which led to the Iraqi government to implement austerity measures were to reduce public spending on several projects, which are less important compared to projects that a
... Show MoreIn this paper an accurate Indian handwritten digits recognition system is
proposed. The system used three proposed method for extracting the most effecting
features to represent the characteristic of each digit. Discrete Wavelet Transform
(DWT) at level one and Fast Cosine Transform (FCT) is used for features extraction
from the thinned image. Besides that, the system used a standard database which is
ADBase database for evaluation. The extracted features were classified with KNearest
Neighbor (KNN) classifier based on cityblock distance function and the
experimental results show that the proposed system achieved 98.2% recognition
rate.
Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R
... Show More