Richards in 1996 introduced the idea of leftly e ─ core transference by using many conditions, including that the difference between the colums (k) is greater than of weight. In this paper, we generalized this idea without the condition of Richards depending on the mathematical and computational solution.
Photonic crystal fiber interferometers are widely used for sensing applications. In this work, solid core-Photonic crystal fiber based on Mach-Zehnder modal interferometer for sensing refractive index was presented. The general structure of sensor applied by splicing short lengths of PCF in both sides with conventional single mode fiber (SMF-28). To apply modal interferometer theory; collapsing technique based on fusion splicing used to excite higher order modes (LP01 and LP11). Laser diode (1550 nm) has been used as a pump light source. Where a high sensitive optical spectrum analyzer (OSA) was used to monitor and record the transmitted. The experimental work shows that the interference spectrum of Photonic crystal fiber interferometer
... Show MoreInterest in belowground plant growth is increasing, especially in relation to arguments that shallow‐rooted cultivars are efficient at exploiting soil phosphorus while deep‐rooted ones will access water at depth. However, methods for assessing roots in large numbers of plants are diverse and direct comparisons of methods are rare. Three methods for measuring root growth traits were evaluated for utility in discriminating rice cultivars: soil‐filled rhizotrons, hydroponics and soil‐filled pots whose bottom was sealed with a non‐woven fabric (a potential method for assessing root penetration ability). A set of 38 rice genotypes including the Oryza
This paper aims to introduce the concepts of -closed, -coclosed, and -extending modules as generalizations of the closed, coclossed, and extending modules, respectively. We will prove some properties as when the image of the e*-closed submodule is also e*-closed and when the submodule of the e*-extending module is e*-extending. Under isomorphism, the e*-extending modules are closed. We will study the quotient of e*-closed and e*-extending, the direct sum of e*-closed, and the direct sum of e*-extending.
The definition of orthogonal generalized higher k-derivation is examined in this paper and we introduced some of its related results.
. Suppose that is the Cayley graph whose vertices are all elements of and two vertices and are adjacent if and only if . In this paper,we introduce the generalized Cayley graph denoted by which is a graph with a vertex set consisting of all column matrices in which all components are in and two vertices and are adjacent if and only if , where is a column matrix that each entry is the inverse of the similar entry of and is matrix with all entries in , is the transpose of and and m . We aim to provide some basic properties of the new graph and determine the structure of when is a complete graph for every , and n, m .
In this paper a Г-ring M is presented. We will study the concept of orthogonal generalized symmetric higher bi-derivations on Г-ring. We prove that if M is a 2-torsion free semiprime Г-ring , and are orthogonal generalized symmetric higher bi-derivations associated with symmetric higher bi-derivations respectively for all n ϵN.
This paper intends to initiate a new type of generalized closed set in topological space with the theoretical application of generalized topological space. This newly defined set is a weaker form than the -closed set as well as -closed set. Some phenomenal characterizations and results of newly defined sets are inculcated in a proper manner. The characteristics of normal spaces and regular spaces are achieved in the light of the generalized pre-regular closed set.
This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a
... Show More