The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
While analytical solutions to Quadratic Assignment Problems (QAP) have indeed been since a long time, the expanding use of Evolutionary Algorithms (EAs) for similar issues gives a framework for dealing with QAP with an extraordinarily broad scope. The study's key contribution is that it normalizes all of the criteria into a single scale, regardless of their measurement systems or the requirements of minimum or maximum, relieving the researchers of the exhaustively quantifying the quality criteria. A tabu search algorithm for quadratic assignment problems (TSQAP) is proposed, which combines the limitations of tabu search with a discrete assignment problem. The effectiveness of the proposed technique has been compared to well-established a
... Show MoreStream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreA hyperboloid solar concentrator (HSC) was designed with a truncation angle side to the entrance aperture by simulation in the Zemax Optical Design software. The (HSC) has a wide exposure range to solar radiation due to the relatively large entrance aperture. The design consists of an entrance aperture facing the sun to obtain the largest possible amount of solar radiation, and a small exit aperture compared to the entrance aperture whose mission is to receive solar radiation after it enters the entrance aperture and reflects it from the inner reflective walls of the (HSC). In the exit aperture, there is a detector to measure the number of rays incident on it, which is a measure of the optical efficiency of the s
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreOriganum majorana (Majorana hortensis), an evergreen herbaceous plant belonging to the Lamiaceae family, has been well known for being used for gastrointestinal, cardiac, respiratory, rheumatologic and many other illnesses, but in wounds management hasn’t been qualified scientifically yet. The goal of the study was to evaluate the wound healing properties of sterols in n-hexane and phenols in ethyl acetate extract fractions of the Iraqi Origanum majorana L aerial parts by contrasting their wound healing abilities with those of commercially available MEBO ointment in a rat excised wound repair model. At various periods, the size of the wounds was measured and skin tissue samples were taken for histopathology. When compared to positive and
... Show MoreAzo derivative ligand[H3L] have been synthesized by the reaction of diazonium salt of p-amino benzoic acid with orcinol in(1:1)mole ratio. The bidente ligand was reacted with the metal ions MnII,FeIIandCrIIIin(2:1)mole ratio via reflux in ethanol using Et3N as a base to give complexes of the general formula: [ M(H2L)2(H2O)x]Cly The synthesized compounds were characterized by spectroscopic methods[ I.R , UV-Vis, A.A and H1 NMR]along with melting point, chloride content and conductivity measurements. The complexes were screend for their in vitro antibacterial activity against one strain of staphylococcus as Gram(+) positive and one strain of pseudomonas as Gram(-) Negative, using the agar diffusion technique.