In this paper, some relations between the flows and the Enveloping Semi-group were studied. It allows to associate some properties on the topological compactification to any pointed flows. These relations enable us to study a number of the properties of the principles of flows corresponding with using algebric properties. Also in this paper proofs to some theorems of these relations are given.
This work is an experimental study about the effects of gas pressure and magnetic field on plasma characteristics produced in an internal hollow electrodes discharge (HED) system. The results show that the breakdown voltage values increase with increasing the working pressure (especially with the presence of a magnetic field). The breakdown voltage depends on the p.d. product, where p is the gas pressure and d is the distance between the electrodes. While the values of current discharge decrease with the increase of the working pressure. The temperature of electron and the number density of electron are calculated from the Boltzmann method and the broadening of Stark, respectively. The results showed that the electron number d
... Show MoreThroughout the centuries, several incidents of mercury toxicity have been reported. Mercury is found in many industries such as battery, thermometer and barometer manufacturing, in the agricultural industry is used in fungicides and in medicine, mercury is used in dental amalgams. An important mechanism involved in cellular injury is induced by exposure to different forms of mercury involves in the induction of oxidative stress. This study was conducted on non-smoker, male working in a chloroalkali plant for different periods, all workers were not suffering from chronic disease. Healthy non-smoker males that are not exposed, matched age were used as controls(C), workers aged (22-61) years, they were di
... Show MoreThe History of Multi Parties and its Effect on Political System in India
The avoidance strategy of prey to predation and the predation strategy for predators are important topics in evolutionary biology. Both prey and predators adjust their behaviors in order to obtain the maximal benefits and to raise their biomass for each. Therefore, this paper is aimed at studying the impact of prey’s fear and group defense against predation on the dynamics of the food-web model. Consequently, in this paper, a mathematical model that describes a tritrophic Leslie-Gower food-web system is formulated. Sokol-Howell type of function response is adapted to describe the predation process due to the prey’s group defensive capability. The effects of fear due to the predation process are considered in the first two levels
... Show MoreThe legal system of found property is considered as a reason or method of preliminary acquisition of ownership, as well as two other reasons, that is to say, the fixture of personal chattels, and the adverse possession, resting on the principles of equity, and included within the English common law of customary origins, which is unwritten and based upon judicial precedents of the English courts, equity and later legislations. It is worth-bearing in mind that the found property is the lost property on which the finder enjoys more rights than all other people, except its original owner. It is also worth-mentioning that the treasure trove is considered as found property in the English law. and it is any object at least 300 years old when fo
... Show MoreA Multiple System Biometric System Based on ECG Data
Background: Ministry of Health, since its establishment, adopted the policy of central financing system and free medical services in all health facilities. The sanction and the decline in per capita spending affect the health financing system, thus in 1997 a new financing policy was adopted as pilot in seven specialized hospital called “self–finance” system in which the cost of care was shifted to the patients, i.e. the funds obtained came from user charges at the health facilities. This system was extended (with some modifications) to all hospitals in 1999 and PHC centers in 2001 and implemented until 2003 when it was discontinued.
Materials and Methods: During the second half of 2004, a review of
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More