The main purpose from this paper is to introduce a new kind of soft open sets in soft
topological spaces called soft omega open sets and we show that the collection of
every soft omega open sets in a soft topological space (X,~,E) forms a soft topology
~
on X which is soft finer than ~
. Moreover we use soft omega open sets to define
and study new classes of soft functions called weakly soft omega open functions and
weakly soft omega closed functions which are weaker than weakly soft open functions
and weakly soft closed functions respectively. We obtain their basic properties, their
characterizations, and their relationships with other kinds of soft functions between
soft topological spaces.
Soil defilement with "raw petroleum" is a standout amongst the most across the board and genuine ecological issues going up against both the industrialized and oil country like Iraq. Along these lines, the impact of "raw petroleum" on soil contamination is one of most critical subjects that review these days. The present examination expects to research "unrefined oil"effectson the mechanical and physical properties of clayey soils. The dirt examples were acquired from Al-Doura area in Baghdad city and arranged by the "Brought together Soil Grouping Framework (USCS)" as silty mud of low pliancy (CL). Research center tests were done on contaminated and unpolluted soil tests with same thickness. The dirtied tests are set up by blending
... Show MoreThe current study is an attempt to assess the cytogenotoxic potential of the ethanolic extract from the leaves of Borago officinalis on Swiss albino male mice. Young Swiss albino mice were orally administered with leaf ethanolic extract of Borago officinalis. Three mice groups were used using different doses of plant extract (T1: 100, T2: 200, and T3:400 mg\kg) in addition to the control negative group (untreated mice) for 7 days to assess mitotic index or 28 days to assess meiotic index. The results revealed that the extract significantly induced the division of disruptive chromosomal changes in the bone marrow and the mean of abnormality was (3.5±0.47, 4.43±0.83, and 5.83±0.96%) for T1, T2, and T3 re
... Show MoreReceipt date:9/1/2020 accepted date:11/24/2020 Publication date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
the Nile River and the Renaissance Dam is one of the most prominent factors that had an important role in the nature of relations between Egypt - Ethiopia, as they contributed to building a relationship that has common characteristics through the nature of the i
... Show MoreNitinol (NiTi) is used in many medical applications, including hard tissue replacements, because of its suitable characteristics, including a close elastic modulus to that of bones. Due to the great importance of the mechanical properties of this material in tissue replacements, this work aims to study the hysteresis response in an attempt to explore the ability of the material to remember its previous mechanical state in addition to its ability to withstand stress and to obtain the optimal dimensions and specifications for the manufacturer of NiTi actuators. Stress-strain examination is done in a computational way using a mutable Lagoudas MATLAB code for various coil radii, environment temperatures, and coil lengths. The computational m
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreSpeech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R
... Show MoreDue to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and
... Show More