Many codiskcyclic operators on infinite-dimensional separable Hilbert space do not satisfy the criterion of codiskcyclic operators. In this paper, a kind of codiskcyclic operators satisfying the criterion has been characterized, the equivalence between them has been discussed and the class of codiskcyclic operators satisfying their direct summand is codiskcyclic. Finally, this kind of operators is used to prove that every codiskcyclic operator satisfies the criterion if the general kernel is dense in the space.
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
The adsorption isotherms and kinetic uptakes of CO2 were measured. Adsorption isotherms were measured at two temperatures 309 K and 333 K and over a pressure range of 1 to 7 bar. Experimental data of CO2 adsorption isotherms were modeled using Langmuir, Freundlich and Temkin. Based on coefficient of correlation it was found that Langmuir isotherm model was well suited with the experimental data of CO2 adsorption isotherms. In addition, Adsorption kinetic of CO2 mixture with N2 containing 10 % by volume CO2 and 90 % by volume N2 were determined in a temperature 36 °C and under the atmospheric pressure .When the flow rate was increased from
... Show MoreThe development of technology used in computerized programs is considered on of the most important topics that is responsible for creating tools that can be used in the business environment, the audit profession is one of those professions that received this development. In order for this profession to be more effective, there must be a tool based on sound (correct) scientific basis that can be based upon to enhance the quality of auditing. The research also aims to propose a computerized program to plan the auditing process according to the methods appropriate to the working environment in the audit offices and companies in Iraq. The computerized program was applied to the research sample and the hypothesis of the research has been prov
... Show MoreAbstract: This paper presents the results of the structural and optical analysis of CdS thin films prepared by Spray of Pyrolysis (SP) technique. The deposited CdS films were characterized using spectrophotometer and the effect of Sulfide on the structural properties of the films was investigated through the analysis of X-ray diffraction pattern (XRD). The growth of crystal became stronger and more oriented as seen in the X-ray diffraction pattern. The studying of X-ray diffraction showed that; all the films have the hexagonal structure with lattice constants a=b=4.1358 and c=6.7156A°, the crystallite size of the CdS thin films increases and strain (ε) as well as the dislocation density (δ) decreases. Also, the optical properties of the
... Show MoreIrisin is a myokine that controls energy metabolism by making adipose tissue brown. The present goal in doing this research was to determine how irisin concentration relates to other biochemical markers of disease. Hemodialysis (HD) for chronic kidney failure. The study included 30 individuals with end-stage renal disease on HD and 30 healthy subjects as the control group. The ages of all patients and the control group ranged from (25 to 60) years. The excluded criteria included patients with viral hepatitis and diabetes. Serum irisin concentration and the level of fasting serum glucose (FSG), urea, creatinine (Cr), total protein (TP), albumin (Alb), albumin to creatinine ratio (ACR), total cholesterol (TC), alanine aminotransferase (ALT),
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreThe fouling depositions of crude oil stream were studied theoretically in a shell and tube heat exchanger to investigate the effect of depositions on the heat transfer process. The employed heat exchanger was with steam flowing in the inner tubes and crude oil in the shell at different velocities and bulk temperatures. It is assumed that fouling occurs only on the heated stream side (crude oil). The analysis was carried out for turbulent flow heat transfer conditions with wide range of Reynolds number, bulk temperature and time. Many previously proposed models for fouling resistance were employed to estimate a new model for fouling rate. It is found that the fouling rate and consequently the heat transfer coefficient were affected by Rey
... Show MoreA mounted specimen of a mustelid animal deposited in the Kurdistan Museum of Natural History, Salahaddin University, Erbil proved to be Mustela erminea (Linnaeus, 1758) and represents a new record for the mammalian fauna of Iraq. Its measurements and some biological noted are provided. Also, two passerine birds; the Red-headed bunting, Emberiza bruniceps Brandt, 1841(Family, Emberizidae) and the Variable wheatear, Oenanthe picata (Blyth, 1847) (Family, Muscicapidae) were recorded for the first time in Iraq. Furthermore, the tree frog Hyla savignyi Audouin, 1829 was found in two locations north east of Iraq with spotted dorsum and having interesting behavior in having the capabil
... Show MoreLocalization is an essential demand in wireless sensor networks (WSNs). It relies on several types of measurements. This paper focuses on positioning in 3-D space using time-of-arrival- (TOA-) based distance measurements between the target node and a number of anchor nodes. Central localization is assumed and either RF, acoustic or UWB signals are used for distance measurements. This problem is treated by using iterative gradient descent (GD), and an iterative GD-based algorithm for localization of moving sensors in a WSN has been proposed. To localize a node in 3-D space, at least four anchors are needed. In this work, however, five anchors are used to get better accuracy. In GD localization of a moving sensor, the algo
... Show More