It is shown that if a subset of a topological space (χ, τ) is δ-semi.closed, then it is semi.closed. By use this fact, we introduce the concept regularity of a topological space (χ, τ) via δ-semi.open sets. Many properties and results were investigated and studied. In addition we study some maps that preserve the δ-semi.regularity of spaces.
Endothelin-1 (ET-1) is a potent vasoconstrictor hormone that has been identified as an important factor
responsible for the development of cardiovascular dysfunctions. ET-1 exerts its vasoconstrictor activity
through two pharmacologically distinct receptors, ETA and ETB that are found in vascular smooth muscle
cells (VSMCs) and the vasodilator activity through an ETB receptor located on endothelial cells. This study
aimed to show the impact of 1µM L-arginine (LA), 100µM tetrahydrobiopterin (BH4), and their combined
effect on ET-1 activity in both lead-treated and lead-untreated rat aortic rings. This means, investigating how
endothelial dysfunction reverses the role of nitric oxide precursor and cofa
Introduction: Elite football performance hinges on rapid tactical decision-making under physical and cognitive strain. While peripheral fatigue’s effects on motor output are well documented, the neurophysiological markers of mental fatigue and their impact on in-game decision making remain underexplored. Objective: To determine how EEG-derived central fatigue indices—frontal theta power and the theta/alpha ratio—relate to tactical decision accuracy and speed in elite football players. Methodology: Twenty male national-level footballers (age 22.4 ± 2.1 years; ≥ 5 years’ experience) completed the Yo-Yo Intermittent Recovery Test Level 1 while wearing an 8-channel dry-electrode frontal EEG headset. Frontal theta
... Show MoreSmart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show MoreBackground: Diabetes and periodontitis are considered as chronic diseases with a bidirectional relationship between them. This study aimed to determine and compare the severity of periodontal health status and salivary parameters in diabetic and non-diabetic patients with chronic periodontitis. Materials and Methods: Seventy participants were enrolled in this study. The subjects were divided into three groups: Group I: 25 patients had type 2 diabetes mellitus with chronic periodontitis, Group 2: 25 patients had chronic periodontitis and with no history of any systemic diseases, Group 3: 20 subjects had healthy periodontium and were systemically healthy. Unstimulated whole saliva was collected for measurement of salivary flow rate and pH.
... Show MoreNuclear structure of 20,22Ne isotopes has been studied via the shell model with Skyrme-Hartree-Fock calculations. In particular, the transitions to the low-lying positive and negative parity excited states have been investigated within three shell model spaces; sd for positive parity states, spsdpf large-basis (no-core), and zbme model spaces for negative parity states. Excitation energies, reduced transition probabilities, and elastic and inelastic form factors were estimated and compared to the available experimental data. Skyrme interaction was used to generate a one-body potential in the Hartree-Fock calculations for each selected excited states, which is then used to calculate the single-particle matrix elements. Skyrme interac
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper