The aim of this research is to study some types of fibrewise fuzzy topological spaces. The six major goals are explored in this thesis. The very first goal, introduce and study the notions types of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where j={δ,θ,α,p,s,b,β} The second goal is to introduce weak and strong forms of fibrewise fuzzy ω-topological spaces, namely the fibrewise fuzzy -ω-topological spaces, weakly fibrewise fuzzy -ω-topological spaces and strongly fibrewise fuzzy -ω- topological spaces. Also, several characterizations and properties of this class are also given as well. In addition, we focused on studying the relationship between weakly fibrewise fuzzy -ω-topological spaces and strongly fibrewise fuzzy -ω-topological spaces The third goal is to present fibrewise fuzzy types of the most importint separation axioms of ordinary fuzz topology namely fibrewise fuzzy (T_0 spaces, T_1 spaces, R_0 spaces, Hausdorff spaces, functionally Hausdorff spaces, regular spaces, completely regular spaces, normal spaces and normal spaces). It also has a lot of results. The fourth goal is to learn more about fibrewise fuzzy topological spaces, particularly fibrewise fuzzy compact and fibrewise locally fuzzy compact spaces. We also look at the connections between the many fibrewise fuzzy separation axioms and fibrewise fuzzy compact (or fibrewise locally fuzzy compact) spaces. We also provide a list of possible responses The fifth goal is to present a modern concept of fibrewise topological spaces known as fibrewise fuzzy ideal topological spaces. As a result, we define fibrewise closed fuzzy ideal topological spaces, fibrewise open fuzzy ideal topological spaces, and fibrewise fuzzy j-ideal topological spaces, where j ∈{α,P,S,b ,β} The sixth goal is to present a new concepts in fibrewise bitopological spaces known as fibrewise fuzzy ij-closed, fibrewise fuzzy ij-compact, fibrewise fuzzy ij-perfect, fibrewise fuzzy weakly ij-closed, and fibrewise fuzzy almost ij-perfect. It also introduces some concepts such as contact fuzzy point, ij-adherent fuzzy point, fuzzy filter, fuzzy filter base, ij-converges to a fuzzy subset, ij-directed toward a fuzzy set, ij-fuzzy continuous, ij-fuzzy closed functions, ij-fuzzy rigid set, ij-fuzzy continuous functions, weakly ij-fuzzy closed, ij-H-fuzzy set, almost ij-perfect bitopological spaces. Obtain some of its fundamental properties and characterizations as well.
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThis book presents the problem of tooth decay due to bacteria Streptococcus mutans one of methods of treatment using 3 extracts of S. persica (miswak) (aqueous, acetone and methanol) and prove its effectiveness and its impact on the gtf (B, C, and D) genes that code the glucosyltransferase (Gtf) enzymes that cause decay membrane compared to the usual means used for the prevention of tooth decay
Conducted two trials separate plants Defla first two seasons, 1998 and 1999 to test the susceptibility Altgveria three varieties including Azharha colored white and pink Qati and pink Qtmr and second seasons 1999 and 2000, two types color Azhaarhama white and pink Qati treated mind half-timbered two types of Alaoxinat IBA and NAA and three concentrations as well as repeatersAdhrt results low Almaah rooting
Porous silicon (P-Si) has been produced in this work by photoelectrochemical (PEC) etching process. The irradiation has been achieved using diode laser of (2 W) power and 810 nm wavelength. The influence of various irradiation times on the properties of P-Si material such as P-Si layer thickness, surface aspect, pore diameter and the thickness of walls between pores as well as porosity and etching rate was investigated by depending on the scanning electron micrograph (SEM) technique and gravimetric measurements.
The study includs,effect of concentration of Lead 0.2 ,0.3 , 0.5, 5 , 10 mg/L and Zinc 0.1,0.5 , 2 , 4 , 8 mg/L lonely or to gether on growth green algae( Scenedesmus quadricauda var . longispina) according to the total qauntity for the cells and the adsorption of the algae to the zn,pb concentration .growth curve and dubbling time growth were calculated with or without there heavy metals . Results shows that there are significant differences (P<0.01) for growth curve and the control. (7.5201 cell /h)and with dubbling times (9.87 cell/h). The heavy metals(Pb, Zn). shows antagonistic effect when both used in media.
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreThe urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.