The aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
Allah Almighty has aggrandized the position of orphans and elevated their status in the society and has given the graces for those who sponsor the orphan and care for and protecting them, even those who rub their heads. The divine care is manifested in the verses of the Holy Bible and the Holy Quran. Therefore, the whole world cared for the orphan, and called for the rights of the orphans in the conferences and the channels. But all that was little effort that does not meet what the orphan need and some were only ink on paper that were not applied. All that mentioned above is necessary in dealing with the study (the rights of orphans in the Old Testament and Islam, a Comparative Study). The study was divided into a Preface and four inquirie
... Show MoreAdverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting AD
... Show MoreThis research aims to know the reality of implementation of Knowledge Management in Saudi Universities Applied in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.
The study investigated the university staff in Shaqra, Thadig, and Huraymila branches, using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.
The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo
... Show MoreThe research aims to verifying the tax exemptions granted in accordance with the Iraqi tax legislations, showing their suitability for basic tax rules, and identifying their role to reduce the tax evasion phenomenon and the negative effects resulting therefrom, which arerepresented by a decrease in the proceeds of tax revenue and therefore leadings to a reduction of public revenues of the state. Also, the research tries to identify the ways to reduce cases of tax evasion due to their reflection positively on the public budgetof the state. The data of the research was collected through two models of questionnaires distributed to a sample of taxpayers from some professions and a sample of the tax administration staff. The research has reac
... Show MoreThe basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.
In this paper, some new types of regularity axioms, namely pairwise quasi-regular, pairwise semi-regular, pairwise pseudo regular and pairwise regular are defined and studied in both ech fuzzy soft bi-closure spaces ( bicsp’s) and their induced fuzzy soft bitopological spaces. We also study the relationships between them. We show that in all these types of axioms, the hereditary property is satisfied under closed fs bi-csubsp of . Furthermore, we define some normality axioms, namely pairwise semi-normal, pairwise pseudo normal, pairwise normal and pairwise completely normal in both bicsp’s and their induced fuzzy soft bitopological spaces, as well as their basic properties and the relationships between them are studied.
... Show MoreThe design of the interior spaces process the product of intellectual civilization expresses the prevailing thought, discoverers of principles and beliefs through the sheen reflects the present, and generating languages graphical variety caused a different revolution in design mounting structure, and because of the complex nature of the interior spaces were and we have to be a reflection of cultural reality of being a form of cultural expression and true embodiment of scientific developments prevailing for each stage where she was born, the changes occurring in human thought and then extremism and the discrepancy tastes among individuals all communities factors have caused a change in the design structure involving modernization an
... Show MoreThe search aims to find out the most important requirements for the success of marshes investment and maximize the expected returns of investment was marked by a problem find aquestion for availability requirements necessary for the success of marshes investment has a research community owners decision in the province Maysan the most important conclusions to the search is that the investment great importance in support of the economy and raising the cultural and social level, there is no investment successful but only with configure the investment environment appropriate economic, social, cultural, political, and security ways. the most important recommendations are working on the provision of the investment environment appropria
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreAbsitract
This research was interested in studying the phrase “I don’t know” in the Lisan al-Arab dictionary, and Lisan al-Arab was based on collecting its material from five dictionaries, including: Tahdhib al-Lugha, al-Muqamah, al-Sahih, and the footnotes of Ibn Berri, al-Nihaya and Gharib al-Hadith. The objection to this phrase, and the discussion of its various implications among linguists and the clarification of the closest and most famous content to it according to the data presented to the researcher in his research journey, and to reach this goal, the research division into a preface, five demands and a conclusion and followed the list of sources and references. To define the lexicon of Lisan al-Ar
... Show More