The topic of supra.topological.spaces considered one of the important topics because it is a generalization to topological.spaces. Many researchers have presented generalizations to supra open sets such as supra semi.open and supra pre.open sets and others. In this paper, the concept of δ∼open sets was employed and introduced in to the concept of supra topology and a new type of open set was extracted, which was named S∼δ∼open. Our research entails the utilization of this category of sets to form a new concepts in these spaces, namely S∼δ∼limit points and S∼δ∼derive points, and examining its relationship with S∼open and S∼reg∼open. Based on this class of sets, we have introduced other new concepts such as S∼isolated points, S∼δ∼congested points, S∼δ∼adherent points, S∼δ∼dense, S∼δ∼nowhere.dense and S∼δ∼Exterior, and explored their properties. Additionally, we have highlighted the distinctions among these concepts through several examples
Abrus precatorius L. is an important medicinal plant belonging to family Fabaceae. The present study was conducted to perform pre-clinical safety evaluation and study the pharmacological effects of the ethanolic seeds extract of A. precatorius in management of pain, psychiatric and neurological conditions. Acute toxicity was performed to study the general behavioural pattern of mice after treatment with the test extract (single doses of 1000, 2000, 3000,4000,5000 mg/kg, body weight) and sub-acute toxicity studies were performed to study the toxic effects of the test extract (1000,2000,3000 mg/kg, per os for 14 days) on different haematological parameters, body and organ weight and histopathology of liver and kidney. The toxicological evalua
... Show MoreFarmers keep trying to avoid using chemical fertilizer without losing high yield. A field experiment was conducted in the fields of Agriculture College, University of Baghdad during winter seasons of 2015 and 2016 to investigate the response of three bread wheat (Triticum aestivum L.) cultivars (Ibaa99, Abu-Ghraib3 and Buhooth22) to the frequency of spraying with biofertilizer (EM-1) (one time at tillering stage, twice at tillering and stem elongation stages and three times at tillering, stem elongation and booting stages) in addition to the control (without spraying), to the increase of grain yield. Randomized complete block design (RCBD), in split plots arrangement and four replications, was used. Spraying treatments were placed as main p
... Show MoreMany researchers tried to prevent or reduce moisture damage and its sensitivity to temperature to improving the performance of hot mix asphalt because it is decreasing the functional and structural life of fixable pavement due to the moisture damage had exposed to it.
The main objective of this study is to inspect the effect of (fly ash “3%, 6%, 12%”, hydrated lime”5%, 10%, 20%” and silica fumes”1%, 2%, 4%) referring to previous research by the net weight asphalt cement as a modified material on the moisture and temperature sensitivity of hot mix asphalt. This was done using asphalt from AL-Nasiria refinery with penetration grade 40-50, nominal maximum size (12.5) mm (surface course) of aggregate and on
... Show MoreAn isolate of Leishmania major was grown on the semisolid medium and incubated at 26ºC. The isolate was irradiated by He: Ne laser (632.8 nm, 10 mW) at exposure times (5, 10, 15, 20, 25, 30) minutes in their respective order. The unirradiated groups represent control group. Growth rate and percentage of viability were examined during six days after irradiation. The change in these two parameters reflects the effect of irradiation on the parasite. The results refers that the general growth effected by irradiation in comparison with un irradiation group, The growth rate of parasite decrease with increasing the exposure time in comparison with control group. Parasite viability decrease with irradiation and the percentage of living cell dec
... Show MoreThis study has been conducted to examin the effect of potassium sorbate at different level of 0.03,0.06,0.10% on the number of bacteria and mold and to extend the storage life of laboratory processed biscuit. The results indicated that the use of 0.03% potassium sorbate prolonged the storage peroid until the third month .three types of bacteria has been isolated from processed biscuit, namely, Staphylococcus aureus, Bacillus cereus, Esherichia coli using 0.06% potassium sorbate showed no growth of bacteria up to six month of storage ,while using of 0.03% and 0.06% potassium sorbate prevent the growth of mold up to three and six months of storage respectively. Both Aspergillus and Penicillium were isolated from the processed biscuit.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAbstract: Recombinant human bone morphogenetic protein-2 (rhBMP-2) and platelet-rich fibrin (PRF) bioactive materials have been used to enhance healing and improve dental implant stability. This study aimed to compare the effect of rhBMP-2 and PRF bioactive materials on dental implant stability at different intervals and to evaluate the correlation of implant length and diameter with implant stability. Two bioactive materials were compared to evaluate their effect on dental implant stability. A total of 32 patients (102 dental implants) were divided into 3 groups: 24 dental implants with bone morphogenetic protein (BMP), 27 dental implants with PRF, and 51 dental implants without BMP or PRF (control group). Data were statistically analyzed
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More