In this paper, we introduce the concepts of Large-lifting and Large-supplemented modules as a generalization of lifting and supplemented modules. We also give some results and properties of this new kind of modules.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreBromelain is a proteolytic enzyme rich in cysteine proteases, extracted from the stem and fruit of pineapple (Ananas comosus). There are several therapeutic applications of the bromelain enzyme, where it has anti-inflammatory, anti-cancer, and antimicrobial activity, reduces joint pain, and accelerates wound healing. In the current study, bromelain enzyme was loaded on silver nanoparticles (Br-AgNPs) prepared using the citrate-reduction Turkevich method. Different characterization analyses were performed, including UV-Vis spectrophotometers, FTIR, SEM, and XRD analyses. Moreover, the antioxidant activity of prepared Br-AgNPs was evaluated by DPPH assay. The results of UV-Vis showed a peak at 434 nm, which referred to the AgNPs f
... Show MoreThe main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreThe results of studying the effects of M. anisopiliae spores on mosquito, C. quinquefasciatus showed a biological effects represented by immature mortality. The mortality increased proportionally with the concentrations of fungal spores, which reached (at high concentration 2×1011 spores / ml), to 86.6, 56.6% in first and late instar larvae, respectively. An important to mention that cumulative death rate was significantly associated with the time, which reached to 56% at 7 day after treatment. In addition, M. anisopiliae had a long period permanence in aquatic habitats; in which the residual effects stay 30 days in aquatic habitats after treatment at laboratory conditions. Interestingly, the long period exposure of fungal spores (30 minut
... Show MoreAnticyclone of synoptic studies that influence weather and climate of Iraq, The aim of
the study is to clarify the effect variation of repetition of Anticyclone and effect on thermal
characteristic in Iraq were pressure level has been analyzed (1000) millibars and that because
of pressure level is the closet to the earth surface and the clarity of climatic phenomenon
based on a systematic analysis of synoptic seeking maps and observation and (12:00)
according to timing GMT for five climatic stations which is (Mosul, Kirkuk, Baghdad, Rutba,
and Basra) and so far three consecutive climatic cycles which is first climatic cycle for period
(1986-1976). and second climatic cycle for period (1997-1987) and third climatic cy
Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreNew data on jumping spiders (Salticidae) and tangle-web spiders (Theridiidae) of Armenia are provided on the basis of recently collected specimens in various regions of Armenia. One species, Ballus rufipes (Simon, 1868) is recorded as new to the Caucasus Region, in addition to the following species: Neon reticulatus (Blackwall, 1853), Pellenes brevis (Simon, 1868), Salticus scenicus (Clerck, 1757) and Synageles dalmaticus (Keyserling, 1863) that belong to a family Salticidae, are recorded in Armenia for the first time.
A further 7 species of Theridiidae are recorded in Armenia for the first time Kochiura aulica (C. L. Koch, 1838), Steatoda albomaculata (De Geer, 1778), Steatoda bipunctata (Linnaeus, 1758), Steatoda castanea Clerk, 175
This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show More