In this paper, new concepts which are called: left derivations and generalized left derivations in nearrings have been defined. Furthermore, the commutativity of the 3-prime near-ring which involves some
algebraic identities on generalized left derivation has been studied.
In recent years, it has been evident that searching for alternative methods with low-price and eco-friendly features that produce high-quality adsorbents is in high demand. In the present work, Rice husk from Iraqi rice named (Amber) had been used as the primary source to produce rice husk ash (RHA) for the removal of the antibiotic metronidazole (Flagyl) from water. After optimum drying of rice husk, rice husk ash (RHA) was obtained at 600 °C using an electric oven. RHA has been investigated for properties using X-ray diffraction (XRD), porosity, and surface area (SA). The experimental work adsorption data were optimized to evaluate Langmuir and Freundlich constants. The thermodynamic parameters likely a change in Gipp's energy (ΔG),
... Show MoreIn this work, we studied the effect of power variation on inductively coupled plasma parameters using numerical simulation. Different values were used for input power (750 W-1500 W), gas temperature 300K, gas pressure (0.02torr), 5 tourns of the copper coil and the plasma was produced at radio frequency (RF) 13.56 MHZ on the coil above the quartz chamber. For the previous purpose, a computer simulation in two dimensions axisymmetric, based on finite element method, was implemented for argon plasma. Based on the results we were able to obtain plasma with a higher density, which was represented by obtaining the plasma parameters (electron density, electric potential, total power, number density of argon ions, el
... Show MoreRecently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreA Multiple System Biometric System Based on ECG Data
Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
Chronic renal failure (CRF) affects thyroid function in multiple ways, including low circulating thyroid hormone concentration, altered peripheral hormone metabolism, disturbed binding to carrier proteins, possible reduction in tissue thyroid hormone content, and increased iodine store in thyroid glands.The target of study is to find a relationship between chronic renal failure and thyroid function.In addition, we tried to study the effect of CRF on serum creatinine dependent on the level of thyroid hormones (T3 and T4) and thyroid stimulating hormones(TSH). Forty patients with chronic renal failure (20 male, 20 female) were enrolled in this study in addition to forty healthy individual as control gro
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform