The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
The current study shows the cytotoxicity effect of the Crassula ovata n-hexane extract on esophagus can¬cer. C. ovata is a perennial succulent plant belonging to the Crassulaceae family. In Africa, the leaves were used medicinally to cure epilepsy and diarrhoea by boiling them in milk. The hexane fraction, which is obtained through the maceration method, demonstrates the presence of many compounds that have an anticancer effect, which are ob¬tained by gas chromatography - mass spectroscopy. The phytosterol compound was isolated by a preparative thin layer chromato¬graph and was identified by liquid chromatography - mass spectroscopy. The hexane fraction was found to possess a strong anticancer effect against esophagus cancer. The
... Show MoreThis paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose
In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the
... Show MoreThree types of extracts ( aquatic, alcoholic, and oily ) were prepared from the fruits of coconuts, and a series of chemical tests were conducted in addition to the use of the FTIR equipment to determine the active locations in the prepared extracts. The results indicated the presence of active compounds (tannins, saponins, flavonoids, turbines and steroids) in the extracts prepared from the fruits of coconuts, also the antimicrobial capability of these extracts were tested on pathogenic bacteria isolated from wounds and burns infections cases. The results proved that the concentration 80 mg/ml of the aquatic extract is the minimum inhibitory concentration for the microbes: Proteus vulgaris and Pseudomonas fluorescence, while the
... Show MoreThe search is contain compared among some order selection criteria (FPE,AIC,SBC,H-Q) for the Model first order Autoregressive when the White Noise is follow Normal distribution and some of non Gaussian distributions (Log normal, Exponential and Poisson distribution ) by using Simulation
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
A OUI,tiper of LWW lig_;:tnds .of ppen sides. of Bis-'Oxad1azoJe· and·
Bis-triazole derived from dichloroetbane and [Bis 0-ohloro et!:ty)
= :=:: =
ether)] (BCEE)' wersynthesi:zed. These inelude: 1, 4- bis[-3{thio- 2 -
. (Chloro·ethyl)l1 1;4 - oxadiazole ......$yl] butane (-L I);1 4 B'is {phenl-
3{th
... Show More