We dealt with the nature of the points under the influence of periodic function chaotic functions associated functions chaotic and sufficient conditions to be a very chaotic functions Palace
In this paper we define and study new generalizations of continuous functions namely, -weakly (resp., w-closure, w-strongly) continuous and the main properties are studies: (a) If f : X®Y is w-weakly (resp., w-closure, w-strongly) continuous, then for any AÌX and any BÌY the restrictions fïA : A®Y and fB : f -1(B)®B are w-weakly (resp., w-closure, w-strongly) continuous. (b) Comparison between deferent forms of generalizations of continuous functions. (c) Relationship between compositions of deferent forms of generalizations of continuous functions. Moreover, we expanded the above generalizations and namely almost w-weakly (resp., w-closure, w-strongly) continuous functions and we state and prove several results concerning it.
According to the theory of regular geometric functions, the relevance of geometry to analysis is a critical feature. One of the significant tools to study operators is to utilize the convolution product. The dynamic techniques of convolution have attracted numerous complex analyses in current research. In this effort, an attempt is made by utilizing the said techniques to study a new linear complex operator connecting an incomplete beta function and a Hurwitz–Lerch zeta function of certain meromorphic functions. Furthermore, we employ a method based on the first-order differential subordination to derive new and better differential complex inequalities, namely differential subordinations.
A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreIn this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.
Recently, young people have shown a desire to keep cats as pets, despite being threatened with health problems including toxoplasmosis. Therefore, the current study was aimed to detect toxoplasmosis infections among of volunteers students as well as spreading health awareness among students and knowledge about the importance of this disease. Prevalence rate and effects of liver functions were tested by measured levels of Aspartate aminotransferase (AST) and Alanine aminotransferase (ALT) enzymes while the OnSiteToxo IgG/IgM combo rapid test was used in the diagnosis of the disease. The blood samples were collected from 76 volunteers (35 male and 41 female). The results showed that, the total percentage of infections was 27.6% and all infect
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreObjective: To determine the effectiveness of hypothermia on renal functions for patients undergoing
coronary artery bypass graft CABG surgery.
Methodology: A purposive (non-probability) sample of (50) patients undergoing Isolated coronary artery
bypass graft surgery consecutively admitted to the surgical ward, and they were followed up in the
intraoperative, Intensive Care Unit (ICU) and in the postoperative (surgical ward). Post-operative renal function
test (glumeruler filteration rate (GFR) by using the Crockroft-Gault formula and serum creatinine level) was
determined first week post operative and post operative renal function was classified on the base of peak of
the serum creatinine level and decline of glomeru
Chaotic features of nuclear energy spectrum in 68Ge nucleus are investigated by nuclear shell model. The energies are calculated through doing shell model calculations employing the OXBASH computer code with effective interaction of F5PVH. The 68Ge nucleus is supposed to have an inert core of 56Ni with 12 nucleons (4 protons and 8 neutrons) move in the f5p-model space ( and ). The nuclear level density of considered classes of states is seen to have a Gaussian form, which is in accord with the prediction of other theoretical studies. The statistical fluctuations of the energy spectrum (the level spacing P(s) and the Dyson-Mehta (or statistics) are well described by the Gaussian orthogonal ens
... Show MoreIn this study, we investigate the behavior of the estimated spectral density function of stationary time series in the case of missing values, which are generated by the second order Autoregressive (AR (2)) model, when the error term for the AR(2) model has many of continuous distributions. The Classical and Lomb periodograms used to study the behavior of the estimated spectral density function by using the simulation.