The purpose of this paper is to introduce a new type of compact spaces, namely semi-p-compact spaces which are stronger than compact spaces; we give properties and characterizations of semi-p-compact spaces.
In this research we investigated the corrosion behavior of the commertialy pure titanium and Ti-6Al-4V alloy that coated with hydroxyapatite by electrochemical deposition with applied voltage (6,9,12) Volt from aqueous solution containing Ca(NO3)2.H2O =7.0 gm/l , (NH4)2HPO4 =3.5 gm/l , Na(NO3)2 = 8.5 gm/l in order to improve the bonding strength of hydroxyapetite and medical metals and alloys and increasing the biocompatibility. The coating layer morphology was investigated by XRD, Optical microscope , and SEM tests, the corrosio tests was made by use senthesys simulated body fluid (SBF) , and we found that the propreate voltage for coatint on Ti was 9 Volt and for Ti-6Al-4Vwas12Volt.
This research worked on identifying the effect of increasing the volume of indebtedness by companies listed on the Iraq Stock Exchange on the trading volume of those companies, and this research included some theoretical concepts related to both debt financing and trading volume, and it represents the research community of the joint-stock companies listed in The Iraq Stock Exchange (the banking sector). As for the research sample, it was deliberately chosen represented by companies with continuous trading without stopping, which reached 10 joint-stock companies, and the period of research was extended during the period 2011-2015, and a set of indicators and financial methods were used In measuring research v
... Show MoreThis paper work new and unprecedented definitions of sets, which we have named supra fan, supra. delta fan, supra. semi delta fan sets, which are generated by three sets of specific type of supra open sets, it was utilized supra open, supra delta open, supra. semi delta open sets with special conditions. It is highlighted many details of these new types of fan sets, their axis, blades and their annular sets using tables. Attention is given to the interior and the closure of these three types in supra topological spaces. The research was further enriched numerous and diverse examples. Subsequently, the focus shifted to supra. semi delta fan sets to prove lemma and theorem.
In this work semi–empirical method (PM3) calculations are carried out by (MOPAC) computational packages have been employed to calculate the molecular orbital's energies for some organic pollutants. The long– chain quaternary ammonium cations called Iraqi Clays (Bentonite – modified) are used to remove these organic pollutants from water, by adding a small cationic surfactant so as to result in floes which are agglomerates of organobentonite to remove organic pollutants. This calculation which suggests the best surface active material, can be used to modify the adsorption efficiency of aniline , phenol, phenol deriviatives, Tri methyl glycine, ester and pecticides , on Iraqi Clay (bentonite) by comparing the theoretical results w
... Show MoreAbstract
Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al
... Show MoreA space X is named a πp – normal if for each closed set F and each π – closed set F’ in X with F ∩ F’ = ∅, there are p – open sets U and V of X with U ∩ V = ∅ whereas F ⊆ U and F’ ⊆ V. Our work studies and discusses a new kind of normality in generalized topological spaces. We define ϑπp – normal, ϑ–mildly normal, & ϑ–almost normal, ϑp– normal, & ϑ–mildly p–normal, & ϑ–almost p-normal and ϑπ-normal space, and we discuss some of their properties.
Long before the pandemic, labour force all over the world was facing the quest of incertitude, which is normal and inherent of the market, but the extent of this quest was shaped by the pace of acceleration of technological progress, which became exponential in the last ten years, from 2010 to 2020. Robotic process automation, work remote, computer science, electronic and communications, mechanical engineering, information technology digitalisation o public administration and so one are ones of the pillars of the future of work. Some authors even stated that without robotic process automation (RPA) included in technological processes, companies will not be able to sustain a competitive level on the market (Madakan et al, 2018). R
... Show MoreInterval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show More