This paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.
ABSTRACT This study closely investigates the elements of Sigmund Freud’s theory “The Uncanny” in one of Larson’s most famous novels. Although the novel touches upon racial issues, the study explores the mysterious relationship between Irene and Clare based on the main features of Freud’s “The Uncanny,” which are represented by hidden sexual desire, envy, supernatural power, and double characters. The aspect of the sexual desire is indicated in the novel by sexual undertones expressed by Irene towards Clare’s physical features. Envy in the novel is expressed by Irene who shows resentful longing aroused by Clare’s possessions and qualities due to her passing to the white community. The aspect of omnipotence of thoughts is in
... Show MoreThis study deals with the subject of violence, but from another perspective, it has not been emphasized in contemporary studies of violence in Arabic and raqi universities, which is the structural or institutional aspect of violence. Traditional studies have focused their analysis of violence on the direct side the violence, The other side of the violence is the hidden violence, which is characterized by a lack of clarity of the underlying factors and its effects are not arises, which makes it the most serious violence, which requires a deep research into the social, political, economic, cultural and psychological structure of society (individuals and institutions). This study was based on the theory of the Norwegian scientist (J
... Show MoreA load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
Abstract
Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The sim
... Show MoreThis paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.
<span lang="EN-US">Increase the in population and kindergarten number, especially in urban areas made it difficult to properly manage waste. Thus, this paper proposed a system dedicated to kindergartens to manage to dispose of waste, the system can be called smart garbage based on internet of things (SGI). To ensure a healthy environment and an intelligent waste in the kindergarten management system in an integrated manner and supported by the internet of things (IoT), we presented it in detail identification, the SGI system includes details like a display system, an automatic lid system, and a communication system. This system supplied capabilities to monitor the status of waste continuously and on IoT website can show the pe
... Show MoreAn assembled pulsed Nd:YAG laser-robot system for spot welding similar and dissimilar metals is presented in this paper. The study evaluates the performance of this system through investigating the possibility and accuracy of executing laser spot welding of 0.2 mm in thickness stainless steel grade AISI302 to 0.5 mm in thickness low carbon steel grade AISI1008. The influence of laser beam parameters (peak power, pulse energy, pulse duration, repetition rate, and focal plane position on the final gained best results are evaluated. Enhancement of the experimental results was carried by a computational simulation using ANSYS FLUENT 6.3 package code.
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreThe internet has been a source of medical information, it has been used for online medical consultation (OMC). OMC is now offered by many providers internationally with diverse models and features. In OMC, consultations and treatments are available 24/7. The covid-19 pandemic across-the-board, many people unable to go to hospital or clinic because the spread of the virus. This paper tried to answer two research questions. The first one on how the OMC can help the patients during covid-19 pandemic. A literature review was conducted to answer the first research question. The second one on how to develop system in OMC related to covid-19 pandemic. The system was developed by Visual Studio 2019 using software object-oriented approach. O
... Show More