Roof in the Iraqi houses normally flattening by a concrete panel. This concrete panel has poor thermal properties. The usage of materials with low thermal conductivity and high specific heat gives a good improvements to the thermal properties of the concrete panel, thus, the indoor room temperature improves. A Mathcad program based on a mathematical model employing complex Fourier series built for a single room building. The model input data are the ambient temperature, solar radiation, and sol-air temperature, which have been treated as a periodic function of time. While, the room construction is constant due to their materials made of it, except the roof properties are taken as a variable generated practically from the
... Show MoreIn this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
The research aimed to identifying :
- Egocentrism of the university students .
- Academic adaptation of the university student.
- Differences in Egocentrism according to the both variable ( Gender and Specialization ) of the university student.
- Differences in academic adaptation according to the both variable ( Gender and Specialization ) of the university student .
- The Contribution of academic adaptation to Egocentrism of the university student .
The sample of the research consisted of ( 400 ) students.
Tow instruments have been us
This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
A new distribution, the Epsilon Skew Gamma (ESΓ ) distribution, which was first introduced by Abdulah [1], is used on a near Gamma data. We first redefine the ESΓ distribution, its properties, and characteristics, and then we estimate its parameters using the maximum likelihood and moment estimators. We finally use these estimators to fit the data with the ESΓ distribution
In this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex.
Personal intelligence is thinking about an other person , understanding him, have sympathy and differentiation between people, and to appreciate their own point of view, with the sensitivity to their motives, behavior, and goals, so this intelligence involves dealing with a person or group of persons effectively and in normal or logical manner.
Emotions management is to achieve emotional balance by controlling the emotions continuously, self disciplining, keeping away from excitement sources, and dealing with bad situations in constructive way to achieve the psychological stability .
- the study aims
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreDrones are highly autonomous, remote‐controlled platforms capable of performing a variety of tasks in diverse environments. A digital twin (DT) is a virtual replica of a physical system. The integration of DT with drones gives the opportunity to manipulate the drone during a mission. In this paper, the architecture of DT is presented in order to explain how the physical environment can be represented. The techniques via which drones are collecting the necessary information for DT are compared as a next step to introduce the main methods that have been applied in DT progress by drones. The findings of this research indicated that the process of incorporating DTs into drones will result in the advanc