This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThere are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
TI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreThe research tagged: the new aesthetic in contemporary world painting. The research contained five chapters. The first chapter dealt with the research problem and its importance. It dealt with the concept of the new aesthetic as a concept concerned with the topics of the mind, i.e. the most comprehensive and diverse topics. The New Aesthetic is an aesthetic and stylistic structure whose taste, aesthetic, artistic and emotional contribute to its structure with awareness of the context. The aim of the research is to identify the new aesthetic in contemporary world painting. As for the objective limits of the research, the researcher was interested in studying the new aesthetic, especially in abstract expressionism, pop art, opera, and conc
... Show MoreA new tridentate ligand has been synthesized derived from phenyl(pyridin-3-yl)methanone. Three coordinated metal complexes were prepared by complexation of the new ligand with Cu(II), Ni(II) and Zn(II) metal salts. The new Schiff base “benzyl -2-[phenyl(pyridin-3-yl)methylidene]hydrazinecarbodithioate” and the new metal complexes were characterized using various physico-chemical and spectroscopic techniques. From the analysis results, the expected structure to the metal complexes are octahedral in geometry for Cu(II) complex, square planner for Ni(II) and tetrahedral for Zn(II) complex. The new compounds are expected to show strong bioactivity against bacteria and cancer cells.
The current research aims at identifying the new marketing directions that in the picture because if the changes and challenges that face the business nowadays, these effect on the future of the new product.
The problem of the research concentrate on the new marketing activities and how to make it appropriate between the product and the market's need, and to fulfill the needs and desire of the customer and it's importance for achieving the economical goals of the organization for a long relationship with the customer.
The resume of the research is about the impact of nowadays marketing and it's effect on knowing the customer instead of concentrating on the important roll of mark
... Show MoreThe study was conducted over the period of Oct 2018 to Apr 2019 and is aimed for the detection and estimation of four hazardous Volatile Organic Compounds VOC (benzene, toluene, ethylbenzene, and xylene) so-called (BTEX) in samples collected from the produced water in the Al-Ahdab oil field in Iraq also to track their availability in the important natural water sources around the field. These compounds pose a risk to human health as well as environment. To avoid the laborious and tiresome conventional extraction methods, water samples were collected and concentrated using solid-phase extraction technique (SPE) which is a robust and cost-effective method of sample extraction with minimal exposure and handling of solvents and then to be analy
... Show MoreThis study aims to examine the main features of the new trends in agenda studies using the secondary analytic approach in analyzing the newest studies in agenda-setting issues from 2007 till 2017, in addition to the quantitative approach.
The researcher has analyzed 110 studies -75 foreign and 35 Arabic - to determine, describe and evaluate the key research trends which came in Arabic and foreign agenda-setting studies. The results confirmed that studies of the agenda theory are increasing steadily worldwide with diversity in the theoretical trends and used research tools. In addition, primary studies focus on content analysis and the survey approach (method). Also, most Arabic agenda-setting studies used the traditional methods and k
A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show More