We define and study new ideas of fibrewise topological space on D namely fibrewise multi-topological space on D. We also submit the relevance of fibrewise closed and open topological space on D. Also fibrewise multi-locally sliceable and fibrewise multi-locally section able multi-topological space on D. Furthermore, we propose and prove a number of statements about these ideas.
<p>In the mobile phone system, it is highly desirable to estimate the loss of the track not only to improve performance but also to achieve an accurate estimate of financial feasibility; the inaccurate estimate of track loss either leads to performance degradation or increased cost. Various models have been introduced to accurately estimate the path loss. One of these models is the Okomura / Hata model, which is recommended for estimating path loss in cellular systems that use micro cells. This system is suitable for use in a variety of environments. This study examines the comparison of path loss models for statistical analysis derived from experimental data collected in urban and suburban areas at frequencies of 150-1500 MHz
... Show MoreThe current research tries to identify the employment of the digital technology in the formation of the theatrical show space. The researcher started with the significant importance of the digital technology and its workings in the formation of the contemporary theatrical show being a modern, artistic, aesthetic, intellectual and technological means to convey the topic in an integrated manner, as well as its close connection with the creative directive vision and the creative designing vision. It provides a variety of models of numerous implications in terms of transmission and advancement of the relationships represented by clarifying the scenography and dramatic conflict forms according to the numerous motivations of the directo
... Show MoreIn this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.
The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
The purchase of a home and access to housing is one of the most important requirements for the life of the individual and the stability of living and the development of the prices of houses in general and in Baghdad in particular affected by several factors, including the basic area of the house, the age of the house, the neighborhood in which the housing is available and the basic services, Where the statistical model SSM model was used to model house prices over a period of time from 2000 to 2018 and forecast until 2025 The research is concerned with enhancing the importance of this model and describing it as a standard and important compared to the models used in the analysis of time series after obtaining the
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The study of entry and reentry dynamics for space vehicles is very important, particularly for manned vehicles and vehicles which is carry important devices and which can be used again. There are three types for entry dynamic, ballistics entry, glide entry and skip entry. The skip entry is used in this work for describing entry dynamics and determining trajectory. The inertia coordinate system is used to derive equations of motion and determines initial condition for skip entry. The velocity and drag force for entry vehicle, where generate it during entry into earth’s atmosphere are calculated in this work. Also the deceleration during descending and determining entry angles, velocities ratio and altitude ratio have been studied. The c
... Show MoreIn this article, the notions are introduced by using soft ideal and soft semi-open sets, which are - - - -closed sets " -closed" where many of the properties of these sets are clarified. Some games by using soft- -semi, soft separation axioms: like ( 0 ( 0 Using many figures and proposition to study the relationships among these kinds of games with some examples are explained.
Our goal in the present paper is to recall the concept of general fuzzy normed space and its basic properties in order to define the adjoint operator of a general fuzzy bounded operator from a general fuzzy normed space V into another general fuzzy normed space U. After that basic properties of the adjoint operator were proved then the definition of fuzzy reflexive general fuzzy normed space was introduced in order to prove that every finite dimensional general fuzzy normed space is fuzzy reflexive.