The main focus of this article is to introduce the notion of rough pentapartitioned neutrosophic set and rough pentapartitioned neutrosophic topology by using rough pentapartitioned neutrosophic lower approximation, rough pentapartitioned neutrosophic upper approximation, and rough pentapartitioned neutrosophic boundary region. Then, we provide some basic properties, namely operations on rough pentapartitioned neutrosophic set and rough pentapartitioned neutrosophic topology. By defining rough pentapartitioned neutrosophic set and topology, we formulate some results in the form of theorems, propositions, etc. Further, we give some examples to justify the definitions introduced in this article.
The multiplicity of connotations in any paper does not mean that there is no main objective for that paper and certainly one of these papers is our research the main objective is to introduce a new connotation which is type-2 fuzzy somewhere dense set in general type-2 fuzzy topological space and its relationship with open sets of the connotation type-2 fuzzy set in the same space topology and theories of this connotation.
Abstract The results of the effect of the type of feed showed a significant increase (P≤0.01) for palm fronds DM during the incubation period of 7, 14, 21 days, a high Mnp superiority in its incubation 14 days, and a significant superiority of Laccase in its incubation 21 days, while the effect of the enzyme concentration on DM was higher Significant at a concentration of 10% of the enzyme, and the interaction between the type of feed and the enzyme together showed a highly significant increase in the treated palm fronds Laccase and Lip in the incubation period of 7 days, and the treated palm fronds Mnp during incubation 14 days. %, 15% for the interaction between the type of coarse feed and the concentration of the enzyme
... Show MoreInterest in belowground plant growth is increasing, especially in relation to arguments that shallow‐rooted cultivars are efficient at exploiting soil phosphorus while deep‐rooted ones will access water at depth. However, methods for assessing roots in large numbers of plants are diverse and direct comparisons of methods are rare. Three methods for measuring root growth traits were evaluated for utility in discriminating rice cultivars: soil‐filled rhizotrons, hydroponics and soil‐filled pots whose bottom was sealed with a non‐woven fabric (a potential method for assessing root penetration ability). A set of 38 rice genotypes including the Oryza
The research is exposed to the concept of rough discourse in contemporary theater with a critical reading that takes the genealogical work as a starting point in deconstructing the references of rough discourse and pursuing its paths in the civilization and cultural framework and how it identifies aesthetically within the theatrical field and the extents of its procedural treatments in order to reveal it and clarify its limits and representations, as the research included the first chapter. (methodological framework), the second chapter (theoretical framework), which included two sections, the first took place under the title (rough dramatization), while the second topic took place under the title (rough drama), and the second chapter re
... Show MoreIn this paper, we give new results and proofs that include the notion of norm attainment set of bounded linear operators on a smooth Banach spaces and using these results to characterize a bounded linear operators on smooth Banach spaces that preserve of approximate - -orthogonality. Noting that this work takes brief sidetrack in terms of approximate - -orthogonality relations characterizations of a smooth Banach spaces.
Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show MoreFlying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreEstablishing coverage of the target sensing field and extending the network’s lifetime, together known as Coverage-lifetime is the key issue in wireless sensor networks (WSNs). Recent studies realize the important role of nature-inspired algorithms in handling coverage-lifetime problem with different optimization aspects. One of the main formulations is to define coverage-lifetime problem as a disjoint set covers problem. In this paper, we propose an evolutionary algorithm for solving coverage-lifetime problem as a disjoint set covers function. The main interest in this paper is to reflect both models of sensing: Boolean and probabilistic. Moreover, a heuristic operator is proposed as a local refinement operator to improve the quality
... Show MoreEight electronic properties; HUMO, LUMO, HOMO-LUMO energy gap, dipole moment point-charge, dipole moment hybrid, molecular weight, heat of formation and zero-point energy of 60 normal and branched alkanes were examined using topology molecular indices. All the electronic properties were calculated using semi-empirical self-consistent molecular orbital theory. The relationship of electronic calculation properties with seven models of topology indices based on degree and/or distance were obtained in terms of their correlation, regression and principal component analysis. Most of the properties were well-modelled (r2 > 0.82) by topology molecular indices except the dipole moment point-charge and hybrid. The PCA resulted
... Show More