Preferred Language
Articles
/
HhgsaZQBVTCNdQwC6BWj
On pre- Open Regular Spaces
...Show More Authors

In this paper, certain types of regularity of topological spaces have been highlighted, which fall within the study of generalizations of separation axioms. One of the important axioms of separation is what is called regularity, and the spaces that have this property are not few, and the most important of these spaces are Euclidean spaces. Therefore, limiting this important concept to topology is within a narrow framework, which necessitates the use of generalized open sets to obtain more good characteristics and preserve the properties achieved in general topology. Perhaps the reader will realize through the research that our generalization preserved most of the characteristics, the most important of which is the hereditary property. Two types of regular spaces have been presented, namely the topological space Rp and the topological space S-Rp. The properties of these two spaces and their relationship with each other, as well as the effect of functions on them, have been studied. In addition several theorems have been proved regarding the sufficient and necessary conditions to make the topological spaces Rp-regular or S-Rp-regular. The above concepts have been linked with a new type of Hausdorff space and the concepts under study are reinforced with examples.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Molecular Liquids
The development of new homogenous and heterogeneous catalytic processes for the treatment of low grade palm oil
...Show More Authors

Low grade crude palm oil (LGCPO) presents as an attractive option as feedstock for biodiesel production due to its low cost and non-competition with food resources. Typically, LGCPO contains high contents of free fatty acids (FFA), rendering it impossible in direct trans-esterification processes due to the saponification reaction. Esterification is the typical pre-treatment process to reduce the FFA content and to produce fatty acid methyl ester (FAME). The pre-treatment of LGCPO using two different acid catalysts, such as titanium oxysulphate sulphuric acid complex hydrate (TiOSH) and 5-sulfosalicylic acid dihydrate (5-SOCAH) was investigated for the first time in this study. The optimum conditions for the homogenous catalyst (5-SOCAH) wer

... Show More
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Science And Nature
On KU-semigroups
...Show More Authors

Inˑthis work, we introduce the algebraic structure of semigroup with KU-algebra is called KU-semigroup and then we investigate some basic properties of this structure. We define the KU-semigroup and several examples are presented. Also,we study some types of ideals in this concept such as S-ideal,k- ideal and P-ideal.The relations between these types of ideals are discussed and few results for product S-ideals of product KU-semigroups are given. Furthermore, few results of some ideals in KU-semigroup under homomorphism are discussed.

Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
on subliminal cryotography
...Show More Authors

in recent years cryptography has played a big role especially in computer science for information security block cipher and public

View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
...Show More Authors
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
On maps of Γ -period 2 on prime Γ- near-rings
...Show More Authors

We present the concept of maps Γ- periodi2 on Γ -near-ring S. Our main goal is to research and explore the presence and mapping traits such as h Γ –hom anti-Γ –hom, Γ –α-derivations of Γ -periodi2 on Γ- near-rings.

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Advances In Intelligent Systems And Computing
Γ-n-Derivations on Semigroup Ideals on Prime Γ-Near-Rings
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
On the Growth of Solutions of Second Order Linear Complex Differential Equations whose Coefficients Satisfy Certain Conditions
...Show More Authors

In this paper, we study the growth of solutions of the second order linear complex differential equations  insuring that any nontrivial solutions are of infinite order. It is assumed that the coefficients satisfy the extremal condition for Yang’s inequality and the extremal condition for Denjoy’s conjecture. The other condition is that one of the coefficients itself is a solution of the differential equation .

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref