Let/. It :0 ---0 G be any two self maps of a compact connected oriented Lie group G. In this paper, for each positive integer k , we associate an integer with fk,hi . We relate this number with Lefschetz coincidence number. We deduce that for any two differentiable maps f, there exists a positive integer k such that k 5.2+1 , and there is a point x C G such that ft (x) = (x) , where A is the rank of G . Introduction Let G be an n-dimensional com -pact connected Lie group with multip-lication p ( .e 44:0 xG--+G such that p ( x , y) = x.y ) and unit e . Let [G, G] be the set of homotopy classes of maps G G . Given two maps f , f G ---• Jollowing [3], we write f. f 'to denote the map G-.Gdefined by 01.11® =A/WO= fiat® ,sea Given a point g EC and a differ-entiable map F: G G , write GA to denote the tangent space of G at g [4,p.10] , and denote by d x F the linear map rig F :Tx0 T, (x)G induced by F , it is called the differential of Fat g [4,p.22]. Let LA, Rx :0 G be respec-tively the left translation Lx(i)=4..(g,e) , and the right translation Rx(1)./..(gcg). Then there is a natural homomorphism Ad ,the adjoin representation, from G to GL(G•), (the group of nonsingular linear transformations of Qdefined as follows:- Ad(g)= deRe, od,Lx. Note that d xRc, ad.; =d(4,( Lx(e)))0 de; =d.(4, 04)=4(40 Re) = d(4(4, (e)))0 (44, =d ar, o (44, . Since G is connected , the image of Ad belongs to the connected component of G(G)containing the identity,i.e. for each g E 0, detAd(g) > 0 . By Exercise Al • Dr.-Prof.-Department of Mathematics- College of Science- University of Baghdad. •• Dr.-Department of Mathematics- College of Science for Woman- University of Baghdad.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Solubility problem of many of effective pharmaceutical molecules are still one of the major obstacle in theformulation of such molecules. Candesartan cilexetil (CC) is angiotensin II receptor antagonist with very low water solubility and this result in low and variable bioavailability. Self- emulsifying drug delivery system (SEDDS) showed promising result in overcoming solubility problem of many drug molecules. CC was prepared as SEDDS by using novel combination of two surfactants (tween 80 and cremophore EL) and tetraglycol as cosurfactant, in addition to the use of triacetin as oil. Different tests were performed in order to confirm the stability of the final product which includes thermodynamic study, determination of self-emulsificat
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreThe present study aimed to identify the extent to which the content of social and national studies courses was included in interactive thinking maps in the educational stages in the Kingdom of Saudi Arabia, and to achieve the goal of the study, the researcher used the descriptive and analytical approach, and the study tool used consisted of a content analysis card; Where it included a list of the types of thinking maps, where the study sample consisted of all social and national studies courses at the elementary and intermediate levels, and it is (12) books for the student in its first and second parts, and after verifying the validity and reliability of the tool, it was applied to the study sample, and the study reached conclusions, inc
... Show MoreQuantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show MoreMethods: 112 placentae samples were investigated during the period from August 2007 to August 2008 under light microscopefor mother aged 15 - 45 years old.Results: It was found that normal placental shapes had no correlation to mother age, while abnormal shapes were found more inyoung age groups. The better placental measured parameters were found in mother age 20-24 years. The percentages ofabnormal umbilical cord insertion were very high compared to other studies. Babies’ gender had a correlation with theplacental thickness; male babies have thicker placentae than females. Male babies have longer umbilical cords with widerdiameter than females. Light microscope picture showed the chorionic villi with isolated fetal blood vessel were hig
... Show MoreWater has a great self-generating capacity that can neutralize the polluting interventions carried out by humans. However, if human activities continue this uncontrolled and unsustainable exploitation of this resource, this regenerating capacity shall fail and it will be jeopardized definitively. Shatt Al-Arab River in South of Iraq. It has an active role in providing water for irrigation, industry, domestic use and a commercial gateway to Iraq. in the last five years Shatt Al-Arab suffered from a rise in pollutants due to the severe decline in sewage networks, irregular networks and pesticide products, as well as the outputs of factories and companies that find their way to water sou
Water has a great self-generating capacity that can neutralize the polluting interventions carried out by humans. However, if human activities continue this uncontrolled and unsustainable exploitation of this resource, this regenerating capacity shall fail and it will be jeopardized definitively. Shatt Al-Arab River in South of Iraq. It has an active role in providing water for irrigation, industry, domestic use and a commercial gateway to Iraq. in the last five years Shatt Al-Arab suffered from a rise in pollutants due to the severe decline in sewage networks, irregular networks and pesticide products, as well as the outputs of factories and companies that find their way to water sources and lead to a widespread collapse of water quality.
... Show More