The research is an article that teaches some classes of fully stable Banach - Å modules. By using Unital algebra studies the properties and characterizations of all classes of fully stable Banach - Å modules. All the results are existing, and they've been listed to complete the requested information.
The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
Background: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.
Type of the study: cross –sectional study.
Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThis paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Abstract
In this research, a study of the behavior and correlation between sunspot number (SSN) and solar flux (F10.7) have been suggested. The annual time of the years (2008-2017) of solar cycle 24 has been adopted to make the investigation in order to get the mutual correlation between (SSN) and (F10.7). The test results of the annual correlation between SSN & F10.7 is simple and can be represented by a linear regression equation. The results of the conducted study showed that there was a good fit between SSN and F10.7 values that have been generated using the suggested mutual correlation equation and the observed data.
Transportation and distribution are the most important elements in the work system for any company, which are of great importance in the success of the chain work. Al-Rabee factory is one of the largest ice cream factories in Iraq and it is considered one of the most productive and diversified factories with products where its products cover most areas of the capital Baghdad, however, it lacks a distribution system based on scientific and mathematical methods to work in the transportation and distribution processes, moreover, these processes need a set of important data that cannot in any way be separated from the reality of fuzziness industrial environment in Iraq, which led to use the fuzzy sets theory to reduce the levels of uncertainty.
... Show MoreThe present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin
This research is devoted to study the strengthening technique for the existing reinforced concrete beams using external post-tensioning. An analytical methodology is proposed to predict the value of the effective prestress force for the external tendons required to close cracks in existing beams. The external prestressing force required to close cracks in existing members is only a part from the total strengthening force.
A computer program created by Oukaili (1997) and developed by Alhawwassi (2008) to evaluate curvature and deflection for reinforced concrete beams or internally prestressed concrete beams is modified to evaluate the deflection and the stress of the external tendons for the externally strengthened beams using Matlab
Natural Language Processing (NLP) deals with analysing, understanding and generating languages likes human. One of the challenges of NLP is training computers to understand the way of learning and using a language as human. Every training session consists of several types of sentences with different context and linguistic structures. Meaning of a sentence depends on actual meaning of main words with their correct positions. Same word can be used as a noun or adjective or others based on their position. In NLP, Word Embedding is a powerful method which is trained on large collection of texts and encoded general semantic and syntactic information of words. Choosing a right word embedding generates more efficient result than others
... Show MoreThis paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.