The concepts of nonlinear mixed summable families and maps for the spaces that only non-void sets are developed. Several characterizations of the corresponding concepts are achieved and the proof for a general Pietsch Domination-type theorem is established. Furthermore, this work has presented plenty of composition and inclusion results between different classes of mappings in the abstract settings. Finally, a generalized notation of mixing maps and their characteristics are extended to a more general setting.
The main focus of this article is to introduce the notion of rough pentapartitioned neutrosophic set and rough pentapartitioned neutrosophic topology by using rough pentapartitioned neutrosophic lower approximation, rough pentapartitioned neutrosophic upper approximation, and rough pentapartitioned neutrosophic boundary region. Then, we provide some basic properties, namely operations on rough pentapartitioned neutrosophic set and rough pentapartitioned neutrosophic topology. By defining rough pentapartitioned neutrosophic set and topology, we formulate some results in the form of theorems, propositions, etc. Further, we give some examples to justify the definitions introduced in this article.
Power-electronic converters are essential elements for the effective interconnection of renewable energy sources to the power grid, as well as to include energy storage units, vehicle charging stations, microgrids, etc. Converter models that provide an accurate representation of their wideband operation and interconnection with other active and passive grid components and systems are necessary for reliable steady state and transient analyses during normal or abnormal grid operating conditions. This paper introduces two Laplace domain-based approaches to model buck and boost DC-DC converters for electromagnetic transient studies. The first approach is an analytical one, where the converter is represented by a two-port admittance model via mo
... Show MoreBackground: Ischemic VSD or ventricular septal rupture (VSR) is a rare but lethal complication of myocardial infarction (MI). Multi-system coronary disease is present in more than 50% of these patients. The event occurs 2-8 days after an infarction and often precipitates cardiogenic shock. The differential diagnosis of postinfarction cardiogenic shock should exclude free ventricular wall rupture and rupture of the papillary muscles. To avoid the high morbidity and mortality associated with the disorder, patients should undergo emergent surgery. Concomitant coronary artery bypass may be required.
Objective: This study stressed on a very serious complication of a common pathology (myocardial infarction), despite it,s lethal complication
In this research, the study of thermal treating by laser, plasma glow discharge and tubular furnace on Ti-6Al-4V alloy coated with hydroxyapatite by methods of dip coating and electrophoretic deposition .A group of samples was coated by dip coating and another group was coated by electrophoretic deposition. The first group was treated by pulse laser 10 (mJ) as energy for samples from both coating with uniform distributed pulses on every single sample surface, The second thermal treating was made by plasma glow discharge in a locally made system with argon atmosphere, 600 Volt , and 6 cm distance between the electrodes, The third treating was made by tubular furnace in air atmosphere and 400 °C for 1 hour duration. T
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe two parameters of Exponential-Rayleigh distribution were estimated using the maximum likelihood estimation method (MLE) for progressively censoring data. To find estimated values for these two scale parameters using real data for COVID-19 which was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. Then the Chi-square test was utilized to determine if the sample (data) corresponded with the Exponential-Rayleigh distribution (ER). Employing the nonlinear membership function (s-function) to find fuzzy numbers for these parameters estimators. Then utilizing the ranking function transforms the fuzzy numbers into crisp numbers. Finally, using mean square error (MSE) to compare the outcomes of the survival
... Show MoreIn recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor
... Show MoreConditional logistic regression is often used to study the relationship between event outcomes and specific prognostic factors in order to application of logistic regression and utilizing its predictive capabilities into environmental studies. This research seeks to demonstrate a novel approach of implementing conditional logistic regression in environmental research through inference methods predicated on longitudinal data. Thus, statistical analysis of longitudinal data requires methods that can properly take into account the interdependence within-subjects for the response measurements. If this correlation ignored then inferences such as statistical tests and confidence intervals can be invalid largely.
Single-input Multiple-output Signals Third-order Active-R Filter for different Circuit Merit Factor Q Configuration is proposed. This paper discusses a new configuration to realize third-order low pass, band pass and high pass. The presented circuit uses Single-input Multiple-output signals, OP-AMP and passive components. This filter is useful for high frequency operation, monolithic IC implementation and it is easy to design .This circuit gives three filter functions low-pass, high-pass and band-pass. This filter circuit can be used for different merit factor (Q) with high pass band gain. This gives better stop-band attenuation and sharper cut-off at the edge of the pass-band. Thus the response shows wider pass-band. The Ideal value of thi
... Show More