In this paper the research introduces a new definition of a fuzzy normed space then the related concepts such as fuzzy continuous, convergence of sequence of fuzzy points and Cauchy sequence of fuzzy points are discussed in details.
Two new nonsymmetrical mesogenic homologous series of terminal substituent ether (series [Vn]) and carboxy (series [VIn]) incorporating azobenzene and 1,3,4-oxadiazole group were synthesized. Both series have been All compounds thus isolated were purified and characterized by elemental analysis, Fourier Transform Infrared Spectroscopy, 1H NMR, along with thermal analysis and texture observation using Differential Scanning Calorimetry (DSC) and Polarizing Optical Microscopy (POM), respectively. All compounds of the first series exhibited liquid crystalline properties. The homologues [V1]-[V3] display a nematic mesophase, the compounds [V4]-[V7] exhibit a dimorphism behavior, nematic (N) and smectic A (SmA) mesophases, the compounds [V8] and
... Show MoreTHE Schiff base reaction played an important role of the condensation reaction between 2-aminophenol and Glyoxylic acid in the presence of calculated amounts of KOH as a catalyst. The reaction has been carried out in ethanol under reflux and stirring condition for 3.5 hrs. All syntheses were carried out under hydrogen gas forming a new potassium (E)-1-hydroxy-2-(2-hydroxyphenylimino)ethanolate ligand type [NO2]. The ligand of the general formula K2[Mn(L2)] type and its Mnп complex K2[Mn(N2O4)] type, has been characterized by spectroscopic methods (F.T-I.R. and U.V-Vis.), elemental analysis (C.H.N) metal content, magnetic susceptibility measurement, Thin-layer chromatography (T.L.C), X-RD powder diffraction, 1H-NMR, 13C-NMR molar conductanc
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreThe main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreIn this work, a series of new Nucleoside analogues (D-galactopyranose linked to oxepanebenzimidazole moiety) was synthesized via multisteps synthesis. The first step involved preparation of two benzimidazoles 2-styrylbenzimidazole and 2-(phenyl ethynyl) benzimidazole via reaction of phenylenediamine with cinnamic acid or ?-phenyl propiolic acid. Electrophilic addition of the prepared benzimidazoles by three anhydrides in the second step afforded (4-6) and (14-16) which in turn were treated with 1,2,3,4-di-O-isopropylidene galactopyranose in the third step to afford a series of the desirable protected nucleoside analogues (7-9) ,(17-19)which after hydrolysis in methanolic sodium methoxidein the fourth step afforded the free nucleoside analog
... Show More