The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators . Furthermore, the concept of a fuzzy compact linear operator in a standard fuzzy normed space is introduced. Also, several fundamental theorems of fuzzy compact linear operators are studied in the same space. More accurately, every fuzzy compact linear operator is proved to be fuzzy bounded where and are two standard fuzzy normed spaces
The concept of -closedness, a kind of covering property for topological spaces, has already been studied with meticulous care from different angles and via different approaches. In this paper, we continue the said investigation in terms of a different concept viz. grills. The deliberations in the article include certain characterizations and a few necessary conditions for the -closedness of a space, the latter conditions are also shown to be equivalent to -closedness in a - almost regular space. All these and the associated discussions and results are done with grills as the prime supporting tool.
The theory of Topological Space Fiber is a new and essential branch of mathematics, less than three decades old, which is created in forced topologies. It was a very useful tool and played a central role in the theory of symmetry. Furthermore, interdependence is one of the main things considered in topology fiber theory. In this regard, we present the concept of topological spaces α associated with them and study the most important results.
Ciprofloxacin (Cip) and hydrocortisone (Hyd) were simultaneously measured as hydrochloride and sodium succinate, respectively, using the H-point standard addition method (HPSAM). The approach can precisely identify Cip in the presence of Hyd with various analyte-to-interference ratios (5:5, 5:10, 10:5, 10:10) µg.mL-1, in mixed samples containing (1-5µg.ml-1) of Cip, at the wavelengths of (236 and 257) nm. In the same way, Hyd was analyzed in the presence of Cip in different analytes with an interference ratio of (5:5, 5:10, 10:5, 10:10) µg.mL-1, in mixed samples containing (1-5 µg.mL-1) of Hyd, at wavelengths of (266 and 278) nm. The satisfactory results show good reproducibility of the dev
... Show MoreIn the Rumaila oilfields in southern Iraq, the Zubair Formation was deposited in a shallow environment as three main facies, delta plain, backshore, and delta front depositional conditions indicating a transition from delta front and delta plain to a highstand level due to the finning upward mode. The facies of the Zubair clasts show well-sorted quartz arenite sandstone, poorly sorted quartz arenite sandstone, clayey sandstone that has not been properly sorted, sandy shale, and shale lithofacies. The minor lithofacies were identified using well-logging methods (gamma ray, spontaneous potential and sonic logs) and petrography. The Zubair clasts are of transition environment that appears to be transported from freshwater and deposited
... Show MoreA mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreHere, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity
In this paper, the concept of contraction mapping on a -metric space is extended with a consideration on local contraction. As a result, two fixed point theorems were proved for contraction on a closed ball in a complete -metric space.
The research seeks to clarify the problems related to the aspects of the financial and accounting process resulting from entering into contractual arrangements with a period of more than 20 years, among which is the research problem represented by the lack of clarity of the foundations and procedures for the recognition of oil costs and additional costs borne by foreign invested companies, which led to a weakening of their credibility and reflection. Negatively "on the measurement and accounting disclosure of financial reports prepared by oil companies, and the research aims to lay down sound procedures for measuring and classifying oil costs and additional costs paid to foreign companies, and recognizing and recording them in th
... Show MoreAlteration of repeat tract length within the SSR of phase variable genes may enhance the persistence of isolates within their host for a long time (a period of months) (Alamro et al.,2014). Alamro et al. (2014) showed there was trend towards selection for OFF state or low expression for five phase variable genes (opc, hmbr, nadA, nalP, hpuAB) in three carriers (V54, V124 and V64) within strains belonging into CC174 and CC167 in first, second and third time points. He concluded that the selection for low or OFF state helped N. meningitidis to persist for a long time (Alamro et al., 2014). The current study aimed to detect the alteration in the repeat tracts of the same five variable genes within the previous three carriers (V54, V124, and V6
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show More