In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.
Information centric networking (ICN) is the next generation of internet architecture with its ability to provide in-network caching that make users retrieve their data efficiently regardless of their location. In ICN, security is applied to data itself rather than communication channels or devices. In-network caches are vulnerable to many types of attacks, such as cache poisoning attacks, cache privacy attacks, and cache pollution attacks (CPA). An attacker floods non-popular content to the network and makes the caches evict popular ones. As a result, the cache hit ratio for legitimate users will suffer from a performance degradation and an increase in the content’s retrieval latency. In this paper, a popularity variation me
... Show MoreThe problem of the research lies in special motor abilities training programs like the balance that positively affect coordination between the nervous system and muscles. These training programs did not get enough attention from athletes especially young athletes; their training was restricted to physical abilities like strength, speed, and endurance instead. The research aimed at designing an apparatus for developing athletes’ balance in national centers for gifted/ ministry of youth and sport so as to provide a measurement for coached in this field. The results showed that the designed apparatus have a positive effect on developing the subjects’ balance in boxing and basketball athletes.
What distinguishes the athlete in dealing with all stimuli is the ability to understand the cognitive rules through which he acts and directs behavior through thinking and regular planning methods in dealing with the environment in a realistic manner, and this comes through techniques and means based on modernity in obtaining information that makes the athlete arrange in His memory is the programs that are the most important crutch for relying on when he asks for them in applying and executing the skill assignment. One of the enhancers of awareness of variables is the ability of coaches to provide openness in modern ideas to find solutions, through which the player can sense and interpret events and produce outputs for quick and successful
... Show MoreThe electronic properties (such as energy gap HOMO levels. LUMO levels, density of state and density of bonds in addition to spectroscopic properties like IR spectra, Raman spectra, force constant and reduced masses as a function of frequency) of coronene C24 and reduced graphene oxide C24OX , where x=1-5, were studied.. The methodology employed was Density Functional Theory (DFT) with Hybrid function B3LYP and 6-311G** basis sets. The energy gap was calculated for C24 to be 3.5 eV and for C24Ox was from 0.89 to 1.6862 eV for x=1-5 ,respectively. These energy gaps values are comparable to the measured gap of Graphene (1-2.2 eV). The spectroscopic propertie
... Show MoreNumerous drilling additives and materials are used continuously because they are necessary to support and give the required properties of the drilling fluid so that to ensure the stability of the borehole. This paper aspires to evaluate the rheological properties of bentonite (montmorillonite) Trefawey as an alternative to using commercial bentonite. Monitoring and evaluating of the rheological and filtration properties were prepared. This exertion aims to focus on the effect of hematite, and barite on the rheological properties of the three aforementioned bentonite types. An improvement in the rheological properties of bentonite (montmorillonite). Trefawey was observed after adding the previous heavy materials. Hematite has by some
... Show MoreDiscrete logarithms are applied in many cryptographic problems . For instance , in public key . and for construction of sets with disti nct sums of k-clcments. The purpose o r this paper
is to modify the method ol' informationl1·iding using discrete logarithms , introduce new properties of St - sets , uscdthe direct product of groups to construct cyclic group and finally, present modified method for knapsack &
... Show MoreThe effect of different magnetic Jiel ds on the Nal(Tl) scintillation detector of (3"x3") and (1.5"x1.5") sizes was studies, using the radioactive source Cs-137.
Two type:; of coils (A,B) were used to produce the magnetic fields. The coil "A" is cylindrical of "9cm" diameter and "9cm" length , and of
2500 turns.
The measurements were taken in two positions ;the first when the crystal inside the coil ,and the second, the PMT inside the coil . The range of the magnetic field was (0.35,0.61,0.84,1.1 1,1.37,1.62,1.87 and
2.12) mT.
The coil "D" consists of two circular and parallel coils of "12 em" distance between them and of "18.5 em" diameter of each other and of "125" turns. rive &
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show More