The main idea of this paper is to define other types of a fuzzy local function and study the advantages and differences between them in addition to discussing some definitions of finding new fuzzy topologies. Also in this research, a new type of fuzzy closure has been defined, where the relation between the new type and different types of fuzzy local function has been studied
The use of non-parametric models and subsequent estimation methods requires that many of the initial conditions that must be met to represent those models of society under study are appropriate, prompting researchers to look for more flexible models, which are represented by non-parametric models
In this study, the most important and most widespread estimations of the estimation of the nonlinear regression function were investigated using Nadaraya-Watson and Regression Local Ploynomial, which are one of the types of non-linear
... Show MoreThe comedian scenes which Shakespeare has entered in some of his tragedies(Hamlet, King Lear, and Macbeth), constantly the wrath of conservative critics and theorists of Western Drama, as big violation to Aristotle’s rules of tragedy that is forbidden to insert comedian scene in tragedy. Chapter one deals with the research problem, and its significance, purpose,Boarders and the definition of Comic Relieve. Chapter two comprises the theoretical framework which has displayed Arist-Otle’s conception about the imitation way of heroes characters between tragedy and comedy, the different function of catharsis in each one. Then the research has exposed the economical and theatrical activities in London during Elizabethan age which was looke
... Show MoreImplementing smart community engagement should consider careful planning and collaboration with numerous stakeholders, including the community. The technology and program must be designed to frame its purpose and should link back to specific goals of implementing smart community engagement. Digital services do not guarantee a smart engagement between the community and the local government. This is the case for the Kubang Pasu local government where several online services have been provided in their attempt to implement the smart community concept. However, understanding on the preferences of features and requirements of existing web-based systems and the impact of these systems is lacking. Therefore, a perception study needs to be condu
... Show MoreThis study aimed to investigate the impact of implementing Glycetin by injection on the productive features of local Iraqi chickens. 100 female hens and 20 roosters from a local Iraqi chicken population, at age 26 weeks. The sample was divided into three groups, in addition to a control group. Each experimental group had 25 female hens, with the same procedure being performed for each individual hen, and 20 roosters, which were reared separately for the purpose of artificial insemination. The avian specimens were housed in separate enclosures, and the experimental conditions were allocated as follows: the initial condition (Control Group) did not receive any injections, whereas condit
This paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material, and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, rec
... Show MoreThis paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material, and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, reconciliation and forgiveness, that promote prosperity which is th
... Show MoreHealth service institutions suffer from challenges resulting from the great changes that our world is witnessing today. This has affected the value that these institutions add to the patient.
This research aims to identify the effect of integrating each of the techniques of QFD and value engineering for the health services provided to the patient to improve the value for him and thus obtain his satisfaction, which is reflected in the reputation of the surveyed hospitals. To achieve this, the descriptive analytical method was used, and a questionnaire was designed to collect the necessary data, which represents a measure of this research. The questionnaire was distri
... Show MoreAbstract
The various countries seek to encourage their local investments through the various policies they follow. The most important of these is the monetary policy, which is a means and procedures taken by the monetary authority to control the supply of money and maintain its stability of its financial impact on economic activity.
The effect of monetary policy is to stimulate domestic investment through money supply that is inversely related to the interest rate and a direct relationship with domestic investment. When money supply increases, interest rates fall and local investment growth rates rise, but when the rise in money supply is high, Inflationary measure
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos