The concept of Cech fuzzy soft bi-closure space ( ˇ Cfs bi-csp) ( ˇ U, L1, L2, S) is initiated and studied by the authors in [6]. The notion of pairwise fuzzy soft separated sets in Cfs bi-csp is defined in this study, and various features of ˇ this notion are proved. Then, we introduce and investigate the concept of connectedness in both Cfs bi-csps and its ˇ associated fuzzy soft bitopological spaces utilizing the concept of pairwise fuzzy soft separated sets. Furthermore, the concept of pairwise feebly connected is introduced, and the relationship between pairwise connected and pairwise feebly connected is discussed. Finally, we provide various instances to further explain our findings.
In this paper, the penetration of the stone column was investigated in order to get the minimum length of the stone column above which the increase in length has little advantage. The effect of using different materials in column are also studied. The material used is granular of different angle of internal friction (). The results of the investigation indicated that the effect of stone column remains constant when the ratio of the thickness of the soft clay layer to the stone column’s diameter is more than 15. The results also indicated that a pronounced effect is obtained when the angle of internal friction of the stone column material is increased.
Naturally available products have been used widely for centuries in handling human disease. The present study aimed to determine the effect of aluminum potassium sulfate addition into the soft liner on tensile strength and peel bond strength. The effect of aluminum potassium sulfate evaluated by two methods, first one include incorporation of KAL (SO4)2 into soft liner monomer in concentration (2%,3% by wt.) while the second method include immersion of soft liner specimens in solution of KAL(SO4)2 in concentration(5%,10% percent) during time periods (0,10 minutes). In conclusions, the results of current study encourage use KAL (SO4)2 within soft liner material
يرغب المرء أن يعيش في منزل يعبر عن اصالة تصميمه ذا اهداف جمالية كحاجته الى تحقيق الأهداف العملية. وعليه فمن الأهمية بمكان ان يشارك أصحابه مع المعنيين[1] بشؤون التصميم... وهنا ارتأت الباحثة ان تقوم بدراسة علمية حديثة حول ورق الجدران ثلاثي الابعاد وتوظيفة في غرفة المعيشة, وباسلوب عصري حديث يجمع بين جمالية التصميم والحداثة , إضافة الى تناول الإضاءة لما لها من دور في ابراز معالم وتفاصيل الأثاث
... Show MoreBackground: Cystatin C is recently considered to be a good predictor of cardiovascular morbidity and mortality in patients with coronary artery disease (CAD)Objectives: Correlation between cystatin and ischemic heart disease.Methods :One hundred forty patients (140) with ischemic heart disease admitted to thin study at Baghdad teaching hospital from the period June. 2011 to Jan. 2012. Those patients was categorized into three groups.Group (A): patients with ischemic heart failure.Group (B): Patients with myocardial infarction.Group (C) patients with unstable angina.All these groups were in comparison to fifty (50) healthy controls. Fasting serum citation (C) were measured in all patients and control in addition to all other routine inves
... Show MoreFrom 144 specimens of tonsillitis which were collected from patient, (children of 3 -12 year olds) there were 70 isolates beta hemolytic and 28 isolates were identified as S. pyogenes. Sensitivity of S. pyogenes isolates to antibiotics was tested, all isolates were sensitive to amoxicillin and cephaloxia while higher resistant were to erythromycin. One isolate whiche was 100 A had a stable characteristics and produce pyrogenic toxin was chosen for study and it was purified and characterized from the cell free supernatant of S. pyrogenes strain.
.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreEstimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show More