The aim of our work is to develop a new type of games which are related to (D, WD, LD) compactness of topological groups. We used an infinite game that corresponds to our work. Also, we used an alternating game in which the response of the second player depends on the choice of the first one. Many results of winning and losing strategies have been studied, consistent with the nature of the topological groups. As well as, we presented some topological groups, which fail to have winning strategies and we give some illustrated examples. Finally, the effect of functions on the aforementioned compactness strategies was studied.
Consider a simple graph on vertices and edges together with a total labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say defined by for all where Also, the value is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by and is the least for which G admits edge irregular h-labeling. In this article, for some common graph families are examined. In addition, an open problem is solved affirmatively.
Background: Polycystic ovary syndrome (PCOS) is a common endocrinopathy in women of
reproductive age with primary features of infertility, menstrual irregularity, and clinical or biochemical
evidence of hyperandrogenism (hirsutism, acne and high androgen level). Vitamin D has a role in the
development of metabolic and endocrine abnormalities in PCOS mediated by insulin resistance.
Objective: Measure serum 25-hydroxy vitamin D levels in women with polycystic ovary syndrome and
compare their levels with age and body mass index matched healthy controls. Also, assess the
correlation between insulin resistance and 25-hydroxy vitamin D among women with PCOS.
Subjects and Methods: Eighty eight women were involved in this st
In this article, we introduced a new concept of mappings called δZA - Quasi contractive mapping and we study the K*- iteration process for approximation of fixed points, and we proved that this iteration process is faster than the existing leading iteration processes like Noor iteration process, CR -iteration process, SP and Karahan Two- step iteration process for 𝛿𝒵𝒜 − quasi contraction mappings. We supported our analytic proof by a numerical example.
In this article, a new efficient approach is presented to solve a type of partial differential equations, such (2+1)-dimensional differential equations non-linear, and nonhomogeneous. The procedure of the new approach is suggested to solve important types of differential equations and get accurate analytic solutions i.e., exact solutions. The effectiveness of the suggested approach based on its properties compared with other approaches has been used to solve this type of differential equations such as the Adomain decomposition method, homotopy perturbation method, homotopy analysis method, and variation iteration method. The advantage of the present method has been illustrated by some examples.
Molecularly imprinted polymers (MIPs) are an effective method for separating enantiomeric compounds. The main objective of this research is to synthesize D-arabinitol MIPs, which can selectively separate D-arabinitol and its potential application to differentiate it from its enantiomer compound through a non-covalent approach. A macroporous polymer was synthesized using D-arabinitol as a template, acrylamide as a functional monomer, ethylene glycol dimethacrylate (EGDMA) being a cross-linker, dimethylsulfoxide (DMSO) being a porogen, as well as benzoyl peroxide being an initiator. After polymer synthesis, D-arabinitol was removed by a mixture of methanol and acetic acid (4:1, v/v). Fourier-Transform Infrared spectroscopy (FT-IR) and Scan
... Show MoreSmishing is a cybercriminal attack targeting mobile Short Message Service (SMS) devices that contains a malicious link, phone number, or email. The attacker intends to use this message to steal the victim's sensitive information, such as passwords, bank account details, and credit cards. One method of combating smishing is to raise awareness and educate users about the various tactics used by SMS phishers. But even so, this method has been criticized for becoming inefficient because smishing tactics are continually evolving. A more promising anti-smishing method is to use machine learning. This paper introduces a number of machine learning algorithms that can be used for detecting smishing. Furthermore, the differences and simil
... Show MoreThe main problem when dealing with fuzzy data variables is that it cannot be formed by a model that represents the data through the method of Fuzzy Least Squares Estimator (FLSE) which gives false estimates of the invalidity of the method in the case of the existence of the problem of multicollinearity. To overcome this problem, the Fuzzy Bridge Regression Estimator (FBRE) Method was relied upon to estimate a fuzzy linear regression model by triangular fuzzy numbers. Moreover, the detection of the problem of multicollinearity in the fuzzy data can be done by using Variance Inflation Factor when the inputs variable of the model crisp, output variable, and parameters are fuzzed. The results were compared usin
... Show MoreWe use the idea of the grill. This study generalized a new sort of linked space like -connected and -hyperconnected and investigated its features, as well as the relationship between it and previously described notions. It also developed new sorts of functions, such as hyperconnected space, and identified their relationship by offering numerous instances and attributes that belong to this set. This set will serve as a starting point for further research into the set many future possibilities. We also use some theorems and observations previously studied and related to the grill and the semi-open to obtain results in this research. We applied the concept of connected to them and obtained results related to connected. The sources related t
... Show More