The main objective of this work is to generalize the concept of fuzzy algebra by introducing the notion of fuzzy algebra. Characterization and examples of the proposed generalization are presented, as well as several different properties of fuzzy algebra are proven. Furthermore, the relationship between fuzzy algebra and fuzzy algebra is studied, where it is shown that the fuzzy algebra is a generalization of fuzzy algebra too. In addition, the notion of restriction, as an important property in the study of measure theory, is studied as well. Many properties of restriction of a nonempty family of fuzzy subsets of fuzzy power set are investigated and it is shown that the restriction of fuzzy algebra is fuzzy algebra too.
In this work, the study of
Infrastructure, especially wastewater projects, plays an important role in the life of residential communities. Due to the increasing population growth, there is also a significant increase in residential and commercial facilities. This research aims to develop two models for predicting the cost and time of wastewater projects according to independent variables affecting them. These variables have been determined through a questionnaire distributed to 20 projects under construction in Al-Kut City/ Wasit Governorate/Iraq. The researcher used artificial neural network technology to develop the models. The results showed that the coefficient of correlation R between actual and predicted values were 99.4% and 99 %, MAPE was
... Show More
Background: Infections are common in the children attending daycare centers how act as predisposes to it. Hygienic interventions have a fundamental role in infection control and disease prevention in child care settings.
Objective: - To evaluate the knowledge, attitude, and practice of nurseries workers in infection prevention and control among the children.
Subjects and Methods: A cross-sectional study using the researcher-developed questionnaire validated by two experts and piloted and 100 nurseries-workers had participated in it.
Result: the mean age of participants was 37.5 years±12.1, (37%) aged 18-30 yrs, 58% married, and 57% with higher education, 54% of n
... Show Morewere prepared by condensation of 6-R-2amino bcnzothiazol with Salicyldehyde.These Schiff bases were found to reach with maleic anhydride and citraconic to give
A demonstration of the inverse kinematics is a very complex problem for redundant robot manipulator. This paper presents the solution of inverse kinematics for one of redundant robots manipulator (three link robot) by combing of two intelligent algorithms GA (Genetic Algorithm) and NN (Neural Network). The inputs are position and orientation of three link robot. These inputs are entering to Back Propagation Neural Network (BPNN). The weights of BPNN are optimized using continuous GA. The (Mean Square Error) MSE is also computed between the estimated and desired outputs of joint angles. In this paper, the fitness function in GA is proposed. The sinwave and circular for three link robot end effecter and desired trajectories are simulated b
... Show MoreMan always reacts by employing data that he lives inside Artworks and he tries to make them an ideal speech that shows the most important intellectual trends to which he belongs, as it happened in the formal building of the ancient arts . Mesopotamia is one of the civilizations that interacted with the intellectual legibility transforming into visual symbols, so it is difficult for the researcher to interpret these symbols without considering the nature of these civilizations in general .
This current search aims to identify similarities and differences in the recruitment of cultural shapes between the works of the sculptors (Mohammed Ghani Hikmat and Murtada Haddad) .
Researcher adopted an approach of analytical description of the
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreAbstract
Background: anabolic androgenic steroids (AASs) are becoming increasingly popular between bodybuilders and people who want to enhance their physiques. However, according to the rise of the Internet and laws prohibiting sales of these substances without prescription, the route of obtaining and administration practices have become more and more dangerous.
Objective: Anabolic-androgenic steroids represents a group of synthetic testosterone derivatives its play an important role in clinical treatment. These group of drugs are widely abused among the general public to increase lean body weight and improve athletic performance. It has been reported that AAS use can cause many adverse e
... Show More