The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
This research aimd to analyze the role of strategic entreprenenial on according to the external performance of a sample of Iraqi private banks, namely, (National Islamic Bank, Iraqi Ahli Bank, Baghdad Bank , Middle East Iraqi Investment Bank) has launched research in fundamental problem stems from the question seeking his response to the characterization of the problem which is improve banking performance through strategic entreprenenial and to achieve the goal of the research was to prepare a questionnaire included a number of questions about the independent research and approved variables accounting for the independent variable strategic entreprenenial and included four dimensions (entreprenenial culture), entreprenenial leader
... Show MoreThis investigation reports application of a mesoporous nanomaterial based on dicationic ionic liquid bonded to amorphous silica, namely nano-N,N,N′,N′-tetramethyl-N-(silican-propyl)-N′-sulfo-ethane-1,2-diaminium chloride (nano-[TSPSED][Cl]2), as an extremely effectual and recoverable catalyst for the generation of bis(pyrazolyl)methanes and pyrazolopyranopyrimidines in solvent-free conditions. In both synthetic protocols, the performance of this catalyst was very useful and general and presented attractive features including short reaction times with high yields, reasonable turnover frequency and turnover number values, easy workup, high performance under mild conditions, recoverability and reusability in 5 consecutive runs without lo
... Show MoreAqueous root extract has been used to examine the green production of silver nanoparticles (AgNPs) by reducing the Ag+ ions in a silver nitrate solution. UV-Vis spectroscopy, X-ray diffraction, field emission scanning electron microscopy, and Fourier transform infrared spectroscopy (FTIR) were used to analyze the produced AgNPs. The AgNPs that were created had a maximum absorbance at 416 nm, were spherical in form, polydispersed in nature, and were 685 nm in size.The AgNPs demonstrated antibacterial efficacy against Escherichia coli and Staphylococcus. The dengue vector Aedes aegypti's second instar larvae were very susceptible to the AgNPs' powerful larvicidal action.
Profiles of indignation and indiscretion in pre-Islamic poetry
Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show More