The research demonstrates new species of the games by applying separation axioms via sets, where the relationships between the various species that were specified and the strategy of winning and losing to any one of the players, and their relationship with the concepts of separation axioms via sets have been studied.
Some metal ions (Mn+2, Co+2, Ni+2, Cu+2, Zn+2, Cd+2 and Hg+2) complexes of quinaldic acid (QuinH) and α-picoline (α-Pic) have been synthesized and characterized on the basis of their , FTIR, (U.V-Vis) spectroscopy, conductivity measurements, magnetic susceptibility and atomic absorption. From the results obtained the following general formula has suggested for the prepared complexes [M(Quin)2( α-Pic)2].XH2O where M+2 = (Mn, Co, Ni, Cu, Zn, Cd and Hg), X = 2, X = zero for (Co+2 and Hg+2) complexes, (Quin-) = quinaldate ion, (α-Pic) = α-picoline. The results showed that the deprotonated ligand (QuinH) by using (KOH) coordinated to metal ions as bidentate ligand through the oxygen atom of the carboxylate group (-COO-) and the nitrogen ato
... Show MoreIn study carried out in the cold storage in college of Agric./Univ. of Baghdad at 8 ? C. shows that Alternaria , Pencillium , Rhizoctonia , Mucor , are the fungi that causes tomato fruits decay. This is the first record of Rhizoctonia and Mucor as a Tomato fruits rot under 8º c in Iraq. There is no fungal infection on cucumber fruits under 8 ? C. . Waxing tomato fruits reduced the severity of the fungi infection and gave shelflife (19 days) under 8 ? C. There is an infection with Mucor was found in tomato fruits kept in perforated polyethylene bages with 16 bores prevent the infection and the lowest severity and frequency of infection was found in waxed tomato fruits. Part of M.Sc thesis of the Second author.
The study involved 45 male and 45 females of diabetic patients type- ?? aged from 40-69years , and with the same numbers of males and females for control , all the patients and controls were without any periodontal diseases and without any systemic disease. Diabetic patients were divided in to three groups according to the degree of periodontitis , and the inflamed gingiva of all groups of diabetic patients were treated with the dried fruits powder (crude) of medicinal plants Quercus robur , Thuja occidenalis , Terminalia chebula, Anethum graveolens , respectively and mixture. Some immunological and antimicrobial factors (IgA, Lactoferrin , Lysozyme ) , were detected in serum and saliva of diabetic patients and the control
... Show MoreSome metal ions (Mn+2, Co+2, Ni+2, Cu+2,Zn+2 and Cd+2) complexes of quodridentats Schiff base derived from (2-hydroxy benzaldehyde and 4,4'-methylenedianiline as primary ligand and 3-picoline (3-pic) secondary ligand have been synthesized and characterized on the basis of their 1H ,13C-NMR, FT-IR, UV-Vis spectroscopy, conductivity measurements, elemental analysis, and magnetic moments, metal to ligands ratio in all complexes has been found to be (1:1:2) (M:Schiff base:3-pic), Schiff base behaves as neutral tetra dentate ligand with (N2,O2) system from the results obtained, the following general formula has suggested for the prepared complexes [M+2(2-mbd)(3-pic)2] and octahedral stereochemistry, Where M+2 = (Mn , Co , Ni , Cu , Zn and Cd), 2
... Show MoreThe optical absorption data of Hydrogenated Amorphous Silicon was analyzed using a Dunstan model of optical absorption in amorphous semiconductors. This model introduces disorder into the band-band absorption through a linear exponential distribution of local energy gaps, and it accounts for both the Urbach and Tauc regions of the optical absorption edge.Compared to other models of similar bases, such as the O’Leary and Guerra models, it is simpler to understand mathematically and has a physical meaning. The optical absorption data of Jackson et al and Maurer et al were successfully interpreted using Dunstan’s model. Useful physical parameters are extracted especially the band to the band energy gap , which is the energy gap in the a
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreSimplification of new fashion design methods
In this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show MoreIn the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More