In this paper, we introduce the concept of almost Quasi-Frobcnius fuzzy ring as a " " of Quasi-Frobenius ring. We give some properties about this concept with qoutient fuzzy ring. Also, we study the fuzzy external direct sum of fuzzy rings.
Within that research, we introduce fibrewise fuzzy types of the most important separation axioms in ordinary fuzz topology, namely fibrewise fuzzy (T 0 spaces, T 1 spaces, R 0 spaces, Hausdorff spaces, functionally Hausdorff spaces, regular spaces, completely regular spaces, normal spaces, and normal spaces). Too we add numerous outcomes about it.
ان الغرض من هذا البحث هو المزج بين القيود الضبابية والاحتمالية. كما يهدف الى مناقشة اكثر حالات مشكلات البرمجة الضبابية شيوعا وهي عندما تكون المشكلة الضبابية تتبع دالة الانتماء مرة دالة الاتنماء المثلثية مرة اخرى، من خلال التطبيق العملي والتجريبي. فضلا عن توظيف البرمجة الخطية الضبابية في معالجة مشكلات تخطيط وجدولة الإنتاج لشركة العراق لصناعة الأثاث، وكذلك تم استخدام الطرائق الكمية للتنبؤ بالطلب واعتماده
... Show MoreThe compound 3-[4Ì„-(4Ë-methoxy benzoyloxy) benzylideneamino]-2-thioxo-imidazolidine-4-one [III] was prepared from the cyclization of thiosemicarbazone [II] with
ethyl α -chloroacetate in the presence of fused sodium acetate. Treatment the later compound
with acetic anhydride yielded the corresponding 1-Acetyl-3-[ 4Ì„- (4Ë- methoxy benzoyloxy)
benzylideneamino] – 2 – thioxo -imidazolidine-4-one [IV]. 1,3-Oxazepine derivatives [V]a-d
and [VI]a-d are obtained from the reaction of compounds[III] and [IV] with different acid
anhydrides, in dry benzene. The FTIR and
1
HNMR spectroscopy are indicated a good
evidence for the formation of the synthesized compounds. Some of the synthesized
This article will introduce a new iteration method called the zenali iteration method for the approximation of fixed points. We show that our iteration process is faster than the current leading iterations like Mann, Ishikawa, oor, D- iterations, and *- iteration for new contraction mappings called quasi contraction mappings. And we proved that all these iterations (Mann, Ishikawa, oor, D- iterations and *- iteration) equivalent to approximate fixed points of quasi contraction. We support our analytic proof by a numerical example, data dependence result for contraction mappings type by employing zenali iteration also discussed.
The aim of this study was to identify the effectiveness of using generative learning model in learning kinetic series on rings and horizontal bar in artistic gymnastics for men ,Also, the two groups were better in learning the two series of movements on the rings and horizontal bar . The experimental method was used to design two parallel groups with pretested and posttest .The sample included third graders at the College of Physical Education and Sports Sciences - University of Baghdad ,The third class (d) was chosen to represent the control group that applied the curriculum in the college, with (12) students per group. After conducting the tribal tests, the main experiment was carried out for (8) weeks at the rate of two units per week di
... Show MoreMany production companies suffers from big losses because of high production cost and low profits for several reasons, including raw materials high prices and no taxes impose on imported goods also consumer protection law deactivation and national product and customs law, so most of consumers buy imported goods because it is characterized by modern specifications and low prices.
The production company also suffers from uncertainty in the cost, volume of production, sales, and availability of raw materials and workers number because they vary according to the seasons of the year.
I had adopted in this research fuzzy linear program model with fuzzy figures
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreIn this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .
Schiff bases (Sh1-Sh3) have been synthesized (p-aminophenol) was condensed with different aromatic aldehyde in ethanol inthe presence of glacial acetic acid as catalyst. These Schiff bases on treatment with monochloroacetyl choride gave 3-chloro-1-(4-hydroxyphenyl)-4-(substituted)azetidin-2-one(Az4-Az6), with αmercaptoacetic acid gave 3-(4-hydroxyphenyl)-2-( substituted)thiazolidin-4-one (Th7-Th9) and with anthranilic acid gave 3-(4-hydroxyphenyl)-2(substituted)-2,3-dihydroquinazolin-4(1H)-one (Qu10-Qu12). The purity of the derivatives was confirmed by TLC. The some compoundsidentify by (FT-IR and1H, 13C-NMR) data. Some of derivatives were evaluated activity against several microbesto determine ability to inhibit bacterial in some h
... Show More