This paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
Iraq suffers the continuing lack of water resources in generdwether it is surface or underearth water or rain. The study of rain has got the utmost importance in order to the rain direction in Iraq and in Mosul in particular and what it will be in future. It also shows the wet as well as the dry seasons and the possibility of expecting them and expecting their quantities in order to invest them and to keep this vital resource The research deals with predict the wet and dry rainy seasons in Mosul using (SPI) Standardized precipitation index extracted from conversion of Gamma distribution to standardized normal distribution , depending on data of monthly rain amounts for 1940-2013 . Results showed existence of 31 w
... Show MoreThe aim of this paper is to design artificial neural network as an alternative accurate tool to estimate concentration of Cadmium in contaminated soils for any depth and time. First, fifty soil samples were harvested from a phytoremediated contaminated site located in Qanat Aljaeesh in Baghdad city in Iraq. Second, a series of measurements were performed on the soil samples. The inputs are the soil depth, the time, and the soil parameters but the output is the concentration of Cu in the soil for depth x and time t. Third, design an ANN and its performance was evaluated using a test data set and then applied to estimate the concentration of Cadmium. The performance of the ANN technique was compared with the traditional laboratory inspecting
... Show Moren this study, 25 clinical isolates of Proteus spp. were collected from urine, wounds and burns specimens from different hospitals in Baghdad city, all isolates were identified by using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifies as Proteus mirabilis and 10 (40 %) isolates were Proteus vulgaris. The susceptibility of P. mirabilis and P. vulgaris isolates towards cefotaxime was (66.6 %) and (44.4 %) respectively; while the susceptibility of P. mirabilis and P. vulgaris isolates towards ceftazidime was (20%). Extended spectrum β-lactamses producing Proteus was (30.7 %). DNA of 10 isolates of P. mirabilis and 4 isolates of P. vulgaris were extracted and de
... Show More
The objective of this study was to develop neural network algorithm, (Multilayer Perceptron), based correlations for the prediction overall volumetric mass-transfer coefficient (kLa), in slurry bubble column for gas-liquid-solid systems. The Multilayer Perceptron is a novel technique based on the feature generation approach using back propagation neural network. Measurements of overall volumetric mass transfer coefficient were made with the air - Water, air - Glycerin and air - Alcohol systems as the liquid phase in bubble column of 0.15 m diameter. For operation with gas velocity in the range 0-20 cm/sec, the overall volumetric mass transfer coefficient was found to decrease w
... Show Morebackground: osteoporosis is a metabolic bone disease that affects women more than men, it is characterized by generalizes reduction of bone mineral density (BMD) leaving a fragile weak bone that is liable to fracture, gonial angle index (GAI) is one of the radio-morphometric indices, it has been controversial whether it is related to bone mineral density or ageing or none of them. The aim of study is to evaluate the role of cone beam computed tomography (CBCT) as a screening tool for diagnosis of osteoporosis and age effect in females using gonial angle index. Material and method: 60 females were divided into 3 groups according to age and (BMD) status into: Group1 (non-osteoporosis 20-30 years), Group2 (non-osteoporosis 50years and above),
... Show MoreThe present study aimed to investigate the acetamiprid effects on biochemical aspects in albino mice. Thirty albino mice at the age of 6-8 weeks and average weight 25±5 g were divided into three groups each having ten (10) healthy mice. The first group was orally administrated with distilled water while the second and third groups were orally administrated with 50 mg/mL and 100 mg/mL respectively of acetamprid (0.1 mL) daily for one week. LD50 of acetamiprid was measured and found to be 200 mg/kg. The parameters of evaluations included liver function using Aspartate Aminotransferase (AST), Alanine Aminotransferase (ALT) and Alkaline Phosphatase (ALP). Lipid profile was anal
... Show MoreTo deduct the childhood status in Iraq, it was important manner to use statistical tools and approaches concerned with interpreting the causal relationships and their attitudes and use classification method for the important effects (variables) to draw an obvious picture of the phenomena under study in order to make it useful through investing, updating and improving it in by demographic studies in the future. Two statistical methods had been used in the field of analyzing data of multivariate analysis namely, Cluster Analysis and Factor Analysis.
The present study focuses on four fundamental axes .The nutrition axis, health axis, Educational axis, and the social axis. The study has ca
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More