Abstract. In this work, some new concepts were introduced and the relationship between them was studied. These concepts are filter directed-toward, nano-closure-directed-toward and nano-closure-converge to point, and some theories and results about these concepts were presented. A definition almost-nano-converges for set, almost-nano-cluster-point, and definition of quasi-nano-Hausdorff-closed and was also called nano-Hausdorff-closed relative, were also presented several theories related to these definitions were presented and the relationship between them was studied . We also provided other generalizations, including nano closure continuous mappings and it was also called as nano-weaklycontinuous- mappings, as well as providing a definition of nano-compact-mappings, nano-rigid a set, almost-nano-closedmappings and, nano-Urysohn where several theories have been presented that have a relationship between these vital species and proved it is main results. Finally, the filter bases presented quite a few theories and results related to nanoperfect- mappings, which summed up three conditions under one condition, i.e. considered another definition of the nanoperfect- mappings by the filter bases.
The Civil Rights era has been an era of struggle for the African American in the
Unites states. Thus, many writers devoted their writing to reflect the racism and
discrimination that many have suffered from, among them is Ralph Ellison.
Ralph Ellison is a 20th century African-American writer and scholar best known for
his renowned, award-winning novel Invisible Man. He illustrates the powerful
social and political forces that conspire to keep black Americans in their place,
denying them the right to life, liberty, and the pursuit of happiness guaranteed to all
Americans. Invisible Man is a 1952 novel that addresses many of the social and intellectual
issues facing African-Americans in the twentieth century. It exa
Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th
... Show MoreThis text and guide discusses the surgical and medical management of congenital heart diseases in both adult and children. It describes the disease, pathology, treatment, complications and follow-up with extensive use of didactic material to educate the reader to the practicalities of the subject. It details the novel research via an extensive literature review, while covering all aspects of the surgical and medical treatment of congenital heart disease. It includes review of the laparoscopic techniques and epidemiology of each disease involved and their prevalence to provide the reader with the full clinical picture. Clinical and Surgical Aspects of Congenital Heart Diseases: Text and Study Guide provides a thorough practical reference fo
... Show MoreThe research studies the melodic and rhythmic characteristics of monologue, in addition to how it was transferred from the Arab homeland to Iraq and reviewed its most prominent performers, as well as a review of the monologue types and their propagation in the Arab homeland such as comical, dramatic, and political and guidance monologues.
The methodological framework included: the problem of the research, the importance of the research and the objective of the research which is to uncover the melodic and rhythmic structure of the monologue in Iraq. The limits of the research included the objective limit tackling the art of monologue and the spatial limit which is Baghdad
... Show MoreBlood and urine samples were collected from 203 patients to study the relationship between Diabetes mellitus and urinary tract infections (UTI). Blood and urine specimens were subjected for estimation of random blood sugar, in addition to detection of the most pathogen bacteria which cause urinary tract infection in diabetic patients. The study included the detection of bacterial sensitivity to some antibiotics used in treating urinary tract infections, and also included the study of genetic basis which cause both types of diabetes mellitus. The results can be summarized as follows: The incidence of type ? diabetes in males was (35.8%), and (45.9%) in females . and type 2 diabetes in males was (49.6%), while in females was (40.16%).The inc
... Show More
The Islamic religion approach Rabbani urges and seeks to bring happiness to people, as Allah says: ((We sent thee not all people glad tidings and a warner, but most people do not know)) Spa: State 28
Islam looks at the concept of educational values through positive behavior derived emerging through formal and informal education. The Islamic approach works on the basis of a systematic and clear rule in the form of an integrated system includes multiple areas. As the lead actor role as the desired position.
Although
In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreThere has been increase in banks and financial institutions interest in governance topic, as it focused all it attention on this topic specially after the growing role and massive expansion of the private sector in economic life , this sector become vital and important and basic role in growth and developing countries economy that’s why there been increase interest in governance and its mechanism , using this mechanism ( board of directors mechanism , ownership concentration mechanism , financial compensation mechanism, minimum rate of capital mechanism) who would adjust and guide the path and orientation of banks and financial institutions as to ensure the achievement of their goals and mission of their desired within th
... Show MoreObjective: The aim of this study to detect the correlation between trace elements such as zinc, copper and
spermatogenesis, sperm viability and motility.
Methodology: Serum and semen samples were collected from one hundred twenty patients with age ranged (20-
50 years) attending the high institute for Embryo Research and Infertility Treatment/ Baghdad University, in
addition to thirty fertile males their age comparable to that of patients. The period of this study was from June
2004 until the end of October 2004.
Results: The result of routine seminal fluid analysis of all infertile males was divided according to WHO, (1999) limit
into four groups: Asthenospermia(A), Asthenoteratospermia(AT), Oligoasthenoteratospermi