In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B is called a fibrewise locally Lindelöf if for each point x of Xb, where bÎB, there exist a nbd W of b and a nbd UÌXW of x such that the closure of U in XW (i.e., XW∩cl(U) ) is fibrewise Lindelöf space over W". Moreover, we study relationships between fibrewise Lindelöf (locally Lindelöf) spaces and some fibrewise separation axioms.
This research aims to:
1 – Make a proposed module for (aesthetics) for the second stage - Department of Art Education under education theories.
2 - Verification from the effect of the proposed module on student achievement and motivation towards learning aesthetics material.
To verification the second goal we wording these two hypotheses:
1- There are no individual differences with statistically significant at level (0.05) between the student's scores average. (Experimental group ) who studied according to the proposed module and the average student's scores (control group) who studied in the usual way for the achievement test for the Aesthetics material.
2- There are no individual differences with statistically signifi
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreIn this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.
Appeared in the light of globalization growing convergence of the distances between the countries in world, this convergence is causing mixing of cultures to become culture is a universal one culture, There are positives and negatives of this mixing and mingling of cultures, consider Loss of cultural identity is one of the biggest negatives the Arab cultural infrastructure in general and Iraq in special. In addition consider subject to not keep the cultural identity is the most important Arab issues and dangerous to our Arab identity in various fields, including design and architecture, highlights here the subject of research on the impact of globalization on the identity of the interior spaces, cafés of Baghdadi, one of the historical
... Show MoreThis Investigation aims to study the effect of adding Steel fibers with different volume fractions Vf (o.5, 0.75, and 1% by volume of concrete) with aspect ratio 100 on mechanical properties of concrete, and also
finding the influence of petroleum products (Kerosene and Diesel) on mechanical properties of Steel Fiber Reinforced Concrete (SFRC).
The experimental work consists of two groups: group one consists of specimens (cubes and prisms) plain and concrete reinforced with steel fiber exposed to continuous curing with water. Group two consists of
specimens (cubes and prisms) plain and concrete reinforced with steel fiber exposed to kerosene and diesel after curing them in water for 28 days before exposure. The results of all te
In this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
the films of cdse pure and doped with copper ratio glass substrate effect od cucomcentration technique thikness doped with copper is an anonmg and the density of state increases
The Iraqi-Kuwaiti relations represent a great issue for the Arab-Arab relations. This relation is characterized by specificity for the tension since the foundation of the State of Kuwait until late. There are many factors that prevented the fulfillment of the aspiration towards the development of the relations, perhaps the most important of which is the issue of Mubarak Great Port which is a difficult issue as far as the relation between the two states is concerned. One year after Iraq put the cornerstone of the Great Faw Port. This is considered as the most important hurdle in front of constructing the relations with the neighbor Kuwait
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MorePseudoephedrine (PSE), often known as Sudafed, belongs to a class of medications known as sympathomimetic amines, which affect the digestive system, respiratory system, and cardiovascular system. This drug has a long history of medical use; it is helpful in treating symptoms of the common cold and flu, sinusitis, asthma, and bronchitis. Due to its central nervous system (CNS) stimulant properties and structural similarity to amphetamine, it is also used for non-medical purposes such as doping agent, to increase focus, and as a substance that gets rid of exhaustion and drowsiness. Nevertheless only a few studies, backed up its impact on solid abdominal organs. The aim of this task is to investigate the effect of some dosages of PSE
... Show More