In this article an attempt has been made to procure the concept of pairwise neutrosophic simply open set, pairwise neutrosophic simply continuous mapping, pairwise neutrosophic simply open mapping, pairwise neutrosophic simply compactness, pairwise neutrosophic simply b-open set, pairwise neutrosophic simply b-continuous mapping, pairwise neutrosophic simply b-open mapping and pairwise neutrosophic simply b-compactness via neutrosophic bi-topological spaces (in short NBTS). Besides, we furnish few illustrative examples on them via NBTS. Further, we investigate some basic properties of them, and formulate several results on NBTSs.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreHepatitis B virus (HBV) infection is a global public health problem. It is estimated that there are 240 million HBV carriers in the world, of whom roughly 600,000 die annually from HBV-related liver disease. A total of 150 individuals were included in this study, 130 individuals of them had hepatitis B infection (patients group); HBs-Ag was detected in their sera by enzyme linked immunosorbent assay (ELISA) technique and was confirmed by real time PCR analysis to detect the viral genetic material, the others were control. Most of HBV patients in this study were located within 20-40 years group with a percentage of 47.7% and within the 40-60 years group with a percentage of 38.5%. Acute infection was confirmed by detection of anti-HBc IgM
... Show MoreNowadays, the development of internet communication and the significant increase of using computer lead in turn to increasing unauthorized access. The behavioral biometric namely mouse dynamics is one means of achieving biometric authentication to safeguard against unauthorized access. In this paper, user authentication models via mouse dynamics to distinguish users into genuine and imposter are proposed. The performance of the proposed models is evaluated using a public dataset consists of 48 users as an evaluation data, where the Accuracy (ACC), False Reject Rate (FRR), and False Accept Rate (FAR) as an evaluation metrics. The results of the proposed models outperform related model considered in the literature.
An experimental and theoretical analysis was conducted for simulation of open circuit cross flow heat
exchanger dynamics during flow reduction transient in their secondary loops. Finite difference
mathematical model was prepared to cover the heat transfer mechanism between the hot water in the
primary circuit and the cold water in the secondary circuit during transient course. This model takes under
consideration the effect of water heat up in the secondary circuit due to step reduction of its flow on the
physical and thermal properties linked to the parameters that are used for calculation of heat transfer
coefficients on both sides of their tubes. Computer program was prepared for calculation purposes which
cover a
In this research, we introduce and study the concept of fibrewise bitopological spaces. We generalize some fundamental results from fibrewise topology into fibrewise bitopological space. We also introduce the concepts of fibrewise closed bitopological spaces,(resp., open, locally sliceable and locally sectionable). We state and prove several propositions concerning with these concepts. On the other hand, we extend separation axioms of ordinary bitopology into fibrewise setting. The separation axioms we extend are called fibrewise pairwise T_0 spaces, fibrewise pairwise T_1 spaces, fibrewise pairwise R_0 spaces, fibrewise pairwise Hausdorff spaces, fibrewise pairwise functionally Hausdorff spaces, fibrewise pairwise regular spaces, fibrewise
... Show MoreIn recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor
... Show MoreBackground: Globally, hepatitis B is one of the most common infectious diseases. Estimates indicate that at least 2 billion people have been infected with the hepatitis B virus (HBV), with more than 378 million people being chronic carriers. Those individuals at higher risk for acquiring HBV and transmitting disease like pregnant women should be screened for hepatitis B surface antigen (HBsAg) to prevent transmission by vaccination and operation. Aim of study: The aim of this study was to determine the prevalence of HBsAg and its associated parameters in pregnant women who referred to antenatal clinic in Baghdad Province. Methods: The 234 apparently healthy pregnant women and their families, husbands and children were se
... Show MoreWe examine 10 hypothetical patients suffering from some of the symptoms of COVID 19 (modified) using topological concepts on topological spaces created from equality and similarity interactions and our information system. This is determined by the degree of accuracy obtained by weighing the value of the lower and upper figures. In practice, this approach has become clearer.
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More