The aim of this research is to study some types of fibrewise fuzzy topological spaces. The six major goals are explored in this thesis. The very first goal, introduce and study the notions types of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where j={δ,θ,α,p,s,b,β} The second goal is to introduce weak and strong forms of fibrewise fuzzy ω-topological spaces, namely the fibrewise fuzzy -ω-topological spaces, weakly fibrewise fuzzy -ω-topological spaces and strongly fibrewise fuzzy -ω- topological spaces. Also, several characterizations and properties of this class are also given as well. In addition, we focused on studying the relationship between weakly fibrewise fuzzy -ω-topological spaces and strongly fibrewise fuzzy -ω-topological spaces The third goal is to present fibrewise fuzzy types of the most importint separation axioms of ordinary fuzz topology namely fibrewise fuzzy (T_0 spaces, T_1 spaces, R_0 spaces, Hausdorff spaces, functionally Hausdorff spaces, regular spaces, completely regular spaces, normal spaces and normal spaces). It also has a lot of results. The fourth goal is to learn more about fibrewise fuzzy topological spaces, particularly fibrewise fuzzy compact and fibrewise locally fuzzy compact spaces. We also look at the connections between the many fibrewise fuzzy separation axioms and fibrewise fuzzy compact (or fibrewise locally fuzzy compact) spaces. We also provide a list of possible responses The fifth goal is to present a modern concept of fibrewise topological spaces known as fibrewise fuzzy ideal topological spaces. As a result, we define fibrewise closed fuzzy ideal topological spaces, fibrewise open fuzzy ideal topological spaces, and fibrewise fuzzy j-ideal topological spaces, where j ∈{α,P,S,b ,β} The sixth goal is to present a new concepts in fibrewise bitopological spaces known as fibrewise fuzzy ij-closed, fibrewise fuzzy ij-compact, fibrewise fuzzy ij-perfect, fibrewise fuzzy weakly ij-closed, and fibrewise fuzzy almost ij-perfect. It also introduces some concepts such as contact fuzzy point, ij-adherent fuzzy point, fuzzy filter, fuzzy filter base, ij-converges to a fuzzy subset, ij-directed toward a fuzzy set, ij-fuzzy continuous, ij-fuzzy closed functions, ij-fuzzy rigid set, ij-fuzzy continuous functions, weakly ij-fuzzy closed, ij-H-fuzzy set, almost ij-perfect bitopological spaces. Obtain some of its fundamental properties and characterizations as well.
RM Abbas, AA Abdulhameed, AI Salahaldin, International Conference on Geotechnical Engineering, 2010
Abstract: This paper presents the results of the structural and optical analysis of CdS thin films prepared by Spray of Pyrolysis (SP) technique. The deposited CdS films were characterized using spectrophotometer and the effect of Sulfide on the structural properties of the films was investigated through the analysis of X-ray diffraction pattern (XRD). The growth of crystal became stronger and more oriented as seen in the X-ray diffraction pattern. The studying of X-ray diffraction showed that; all the films have the hexagonal structure with lattice constants a=b=4.1358 and c=6.7156A°, the crystallite size of the CdS thin films increases and strain (ε) as well as the dislocation density (δ) decreases. Also, the optical properties of the
... Show MoreThe current research aims to identify the types and rates and the reasons for the crimes that are with the origin and sexual scattered deviation between the fabric of Iraqi society, which reticent about because of the culture of the community, where he offered a researcher investigator justice and tribal leaders and lawyers about proportion and the types and causes of crime is the origin of sexual deviance and finally a question asked a researcher in 1000 young lived their adolescence days of the former regime (1979-2003) from going to brothels researcher found that 920 people and 92% had gone to the house to practice adultery and that 70 of them, and by 7% had engaged in masturbation only and that 10 of them have not committed anything
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreUnderstanding of in-situ stress profiles and orientations plays a vital role in designing a successful hydraulic fracturing treatment. This paper is an attempet to examine the effect of lithology and in situ stress on geometery of hydraulic fractures. A hydraulic fracturing design simulator software called FracproPT with various capabilities for designing most of hydraulic fracture was used for simulate and optimize the hydraulic fracturing. For studying purpose, three different cases of stress gradient contrast between different formations are considered in this study (0.4, 0.5 and 0.75 psi/ft). The results obtained from the simulator showed that lithologies surrounding the pay zone have an effect on the fracture
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on
... Show More