In this thesis, we study the topological structure in graph theory and various related results. Chapter one, contains fundamental concept of topology and basic definitions about near open sets and give an account of uncertainty rough sets theories also, we introduce the concepts of graph theory. Chapter two, deals with main concepts concerning topological structures using mixed degree systems in graph theory, which is M-space by using the mixed degree systems. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are defined and studied. In chapter three we study supra-approximation spaces using mixed degree systems and primary object in this chapter are two topological spaces, namely o-space and i-space. In chapter four we introduce two new approximation operators using mixed degree systems and comparing of them and we find the accuracy of the second new approximation operator is more thin the first new approximation operator. For reason we study in detail the properties of the second new operator. Finally, in chapter five we introduce new generalization of rough set theory using a finite number of graphs by using the second new approximation operators in the preiow chapter. Several characterizations and properties of these concepts are obtained.
Abstract
In this paper presents two dimensional turbulent flow of different nanofluids and ribs configuration in a circular tube have been numerically investigation using FLUENT 6.3.26. Two samples of CuO and, ZnO nanoparticles with 2% v/v concentration and 40 nm as nanoparticle diameter combined with trapezoidalribs with aspect ratio of p/d=5.72 in a constant tube surface heat flux were conducted for simulation. The results showed that heat flow as Nusselt number for all cases raises with Reynolds number and volume fraction of nanofluid, likewise the results also reveal that ZnO with volume fractions of 2% in trapezoidal ribs offered highest Nusselt number at Reynolds number of Re= 30000.
Key
... Show MoreBackground: Methotrexate (MTX) was one of the first drugs synthesized for a specific chemotherapeutic purpose used to inhibit folic acid (FA) for the treatment of acute lymphoblastic leukemia in children. Its history is closely related to the discovery and characterization of folic acid. It is used clinically in medicine to treat a range of cancerous and noncancerous conditions. MTX is currently used in gynecology to treat disorders arising from trophoblastic tissue, namely, ectopic pregnancy. MTX, the most frequently used diseasemodifying anti-rheumatic drug (DMARD), suppresses disease activity and reduces joint damage. The aim of study: It is designed to demonstrate the effect of MTX (7.5 mg/wk.) on the histogenesis of gonad (testis) of n
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreSelf-criticism is that a person confronts himself with his mistakes in order to reform and develop them for the better, motivate them and inspire hope in them to push them forward and continue to give in this life. The Holy Qur’an teaches us, through the models it cited in its verses, that this is through repentance, a feeling of remorse, and a determination to leave mistakes, and quit disobedience and sins, etc., and all this is done through constructive criticism, and at the same time, one must realize his strengths. , in order to succeed in preserving it and employing it in the right path that pleases God, His Messenger, himself and his society. This has been explained through an introduction, two topics and a conclusion, and God is t
... Show MoreThe depreciation of the Iraqi dinar against the US dollar, reaching low levels and causing disruptions in the local markets, has had detrimental effects on individuals and companies, particularly those with limited income and the poor. The local currency approached around 1600 dinars per dollar, after the official exchange rate had stabilized at around 1450 dinars per US dollar. This depreciation in the value of the Iraqi dinar can be attributed to financial speculation among currency traders, which directly affected exchange rates and illicit dollar smuggling operations. Bank transfers are also important alongside financial transactions, especially in light of current economic developments in the 21st century. To prevent currency s
... Show MoreMycotoxins are secondary by-products of mold metabolism and are accountable for human and animal mycotoxicosis. The most serious trichothecenic mycotoxin is the fungal T-2 mycotoxin. T-2 mycotoxin impaired nutrient absorption, metabolism, and then, eliciting severe oxidoreductive stress. Diet plays a key role beyond the supply of nutrients in order to promote animal and human health. Organic acids have been commonly used to exert antioxidative stress capacity in the liver and gut ecosystem. This study is planned to explore, the competence of using (X-MoldCid®) during chronic T-2 mycotoxicosis course in rat. Rats were allocated into 4 main groups, (CN-Gr), negative control and was allowed for the free access to the normal rats chow and the
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show More