This paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
Two different oxidative desulfurization strategies based on oxidation/adsorption or oxidation/extraction were evaluated for the desulfurization of AL-Ahdab (AHD) sour crude oil (3.9wt% sulfur content). In the oxidation process, a homogenous oxidizing agent comprising of hydrogen peroxide and formic acid was used. Activated carbons were used as sorbent/catalyst in the oxidation/adsorption process while acetonitrile was used as an extraction solvent in the oxidation/extraction process. For the oxidation/adsorption scheme, the experimental results indicated that the oxidation desulfurization efficiency was enhanced on using activated carbon as catalyst/sorbent. The effects of the operating conditions (contact time, temperat
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show MoreIn This paper, sky radio emission background level associated with radio storm burst for the Sun and Jupiter is determined at frequency (20.1 MHz). The observation data for radio Jove telescope for the Sun and Jupiter radio storm observations data are loaded from NASA radio Jove telescope website, the data of Sunspot number are loaded from National Geophysical Data Center, (NGDC). Two radio Jove stations [(Sula, MT), (Lamy, NM)] are chose from data website for these huge observations data. For the Sun, twelve figures are used to determine the relation between radio background emission, and the daily Sunspot number. For Jupiter a twenty four figures are used to determine the relation between radio background emission and diffraction betwe
... Show MoreThis work focuses on the use of biologically produced activated carbon for improving the physi-co-chemical properties of water samples obtained from the Tigris River. An eco-friendly and low-cost activated carbon was prepared from the Alhagi plant using potassium hydroxide (KOH) as an impregnation agent. The prepared activated carbon was characterised using Fourier-transform infrared spectroscopy to determine the functional groups that exist on the raw material (Alhagi plant) and Alhagi activated carbon (AAC). Scanning electron microscope–energy-dispersive X-ray spectroscope was also used to investigate the surface shape and the elements that compose the powder. Brunauer–Emmett–Teller surface area analysis was used to evaluate the spe
... Show More