We have studied some types of ideals in a KU-semigroup by using the concept of a bipolar fuzzy set. Bipolar fuzzy S-ideals and bipolar fuzzy k-ideals are introduced, and some properties are investigated. Also, some relations between a bipolar fuzzy k-ideal and k-ideal are discussed. Moreover, a bipolar fuzzy k-ideal under homomorphism and the product of two bipolar fuzzy k-ideals are studied.
In this work, excess properties (eg excess molar volume (VE), excess viscosity (ȠE), excess Gibbs free energy of activation of viscos flow (ΔG* E) and molar refraction changes (ΔnD) of binary solvent mixtures of tetrahydrofurfuryl alcohol (THFA) with aromatic hydrocarbons (benzene, toluene and p-xylene) have been calculated. This was achieved by determining the physical properties including density ρ, viscosity Ƞ and refraction index nD of liquid mixtures at 298.15 K. Results of the excess parameters and deviation functions for the binary solvent mixtures at 298.15 K have been discussed by molecular interactions that occur in these mixtures. Generally, parameters showed negative values and have been found to fit well to Redlich-Kister
... Show MoreA new complex of Cr(UI) has been prepared. The kinetics and eqailibrium study of the substitution reaction for the complex Trans KfCr(ox)z(H 0)2].3l--h0 {T I }, with 4-aminoantipyrine {AAP}, bave been per£Qrm d in aqueous media at .(pH. = 4.9, 5.6 and 6.0) (!!?0.4M NaN03). Activation pararrieters for the reac(ions are {Eat= l.89l kCal
mor 1 , l:t=89.29 kCal mo1"1  
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreAt the temperature 298.15 K, some physical properties such as: refractive indices (nD), viscosities (η) and densities (ρ) were studied in four liquid-liquid mixtures: carboxylic acids (HCOOH, CH3COOH, CH3CH2COOH and CH3CH2CH2COOH) with tetrahydrofurfuryl alcohol (THFA) with the identified configuration set. These empirical data were utilized to estimate the excess molar volumes (Vm E), refractive index perversions (ΔR), viscosity deviations (ηE) and excess molar Gibbs free energy (ΔG*E). Values of Vm E, ηE , ΔG*E and ΔR were plotted versus mole fraction of tetrahydrofurfuryl alcohol. In all cases, the values of Vm E, ηE , ΔG*E and ΔR that obtained in this study were found to be negative at 298.15 K. The excess parameters
... Show MoreCo(II) ion was determined by a new, accurate, sensitive and rapid method via a
continuous flow injection analysis (CFIA) with a chemiluminescence reaction based on
the oxidation of Luminol which is loaded on poly acrylic acid gel beads by hydrogen
peroxide in presence of Cobalt (II) ion as a chemiluminescence catalyst. Chemical and
physical parameters were investigated to obtain the best conditions. Linear dynamic
range of Cobalt (II) ion was from 0.1-20.0 μg.ml-1 with a correlation coefficient r =
0.9758, limit of detection (L.O.D) 0.2 ng/sample from the step wise dilution of lowest
concentration in the calibration graph with the percentage relative standard deviation for
3 μg.ml-1 Co(ll) solution is 0.8537% (n
The objective of this research is employ the special cases of function trapezoid in the composition of fuzzy sets to make decision within the framework of the theory of games traditional to determine the best strategy for the mobile phone networks in the province of Baghdad and Basra, has been the adoption of different periods of the functions belonging to see the change happening in the matrix matches and the impact that the strategies and decision-making available to each player and the impact on societ
... Show MoreIn this research was to use the method of classic dynamic programming (CDP) and the method of fuzzy dynamic programming (FDP) to controlling the inventory in N periods and only one substance ,in order to minimize the total cost and determining the required quantity in warehouse rusafa principal of the ministry of commerce . A comparison was made between the two techniques، We found that the value of fuzzy total cost is less than that the value of classic total cost
In this paper we introduce the notions of bi-ideal with respect to an element r
denoted by (r-bi- ideal ) of a near ring , and the notion fuzzy bi- ideal with respect
to an element of a near ring and the relation between F-r-bi-ideal and r-bi-ideal of
the near ring, we studied the image and inverse image of r-bi- ideal under
epimomorphism ,the intersection of r-bi- ideals and the relation between this ideal
and the quasi ideal of a near ring, also we studied the notion intuitionistic fuzzy biideal
with respect to an element r of the near ring N, and give some theorem about
this ideal .