Preferred Language
Articles
/
ijs-6003
On Weakly Soft Omega Open Functions and Weakly Soft Omega Closed Functions in Soft Topological Spaces
...Show More Authors

The main purpose from this paper is to introduce a new kind of soft open sets in soft
topological spaces called soft omega open sets and we show that the collection of
every soft omega open sets in a soft topological space (X,~,E) forms a soft topology
  ~
on X which is soft finer than  ~
. Moreover we use soft omega open sets to define
and study new classes of soft functions called weakly soft omega open functions and
weakly soft omega closed functions which are weaker than weakly soft open functions
and weakly soft closed functions respectively. We obtain their basic properties, their
characterizations, and their relationships with other kinds of soft functions between
soft topological spaces.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 28 2018
Journal Name
International Journal Of Engineering & Technology
Crude Oil Effect on the Clayey Soil Mechanical and Physical Properties
...Show More Authors

Soil defilement with "raw petroleum" is a standout amongst the most across the board and genuine ecological issues going up against both the industrialized and oil country like Iraq. Along these lines, the impact of "raw petroleum" on soil contamination is one of most critical subjects that review these days. The present examination expects to research "unrefined oil"effectson the mechanical and physical properties of clayey soils. The dirt examples were acquired from Al-Doura area in Baghdad city and arranged by the "Brought together Soil Grouping Framework (USCS)" as silty mud of low pliancy (CL). Research center tests were done on contaminated and unpolluted soil tests with same thickness. The dirtied tests are set up by blending

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Cytogenetic and Cytotoxic Potentials of Borago officinalis on Albino Male Mice
...Show More Authors

       The current study is an attempt to assess the cytogenotoxic potential of the ethanolic extract from the leaves of Borago officinalis on Swiss albino male mice. Young Swiss albino mice were orally administered with leaf ethanolic extract of Borago officinalis. Three mice groups were used using different doses of plant extract (T1: 100, T2: 200, and T3:400 mg\kg) in addition to the control negative group (untreated mice) for 7 days to assess mitotic index or 28 days to assess meiotic index.  The results revealed that the extract significantly induced the division of disruptive chromosomal changes in the bone marrow and the mean of abnormality was (3.5±0.47, 4.43±0.83, and 5.83±0.96%) for T1, T2, and T3 re

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Advanced Pharmacy Education And Research
The effect of formulation and process variables on prepared etoricoxib ‎Nanosponges
...Show More Authors

View Publication
Scopus (1)
Crossref (4)
Scopus Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
The Renaissance Dam Project and its impact on Egyptian – Ethiopian relation
...Show More Authors

Receipt date:9/1/2020 accepted date:11/24/2020 Publication date:12/31/2021

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

the Nile River and the Renaissance Dam is one of the most prominent factors that had an important role in the nature of relations between Egypt - Ethiopia, as  they contributed to building a relationship that has common characteristics through the nature of the i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Iraqi Journal Of Physics
Influence of NiTi Spring Dimensions and Temperature on the Actuator Properties
...Show More Authors

Nitinol (NiTi) is used in many medical applications, including hard tissue replacements, because of its suitable characteristics, including a close elastic modulus to that of bones. Due to the great importance of the mechanical properties of this material in tissue replacements, this work aims to study the hysteresis response in an attempt to explore the ability of the material to remember its previous mechanical state in addition to its ability to withstand stress and to obtain the optimal dimensions and specifications for the manufacturer of NiTi actuators. Stress-strain examination is done in a computational way using a mutable Lagoudas MATLAB code for various coil radii, environment temperatures, and coil lengths. The computational m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (10)
Scopus
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps
...Show More Authors

Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Energy management and storage systems on electric vehicles: A comprehensive review
...Show More Authors

View Publication
Scopus (43)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Alexandria Engineering Journal
Impact of development on Baghdad’s urban microclimate and human thermal comfort
...Show More Authors

View Publication
Scopus (37)
Crossref (38)
Scopus Clarivate Crossref
Publication Date
Tue Jan 16 2024
Journal Name
International Journal Of Analysis And Applications
Fear and Hunting Cooperation's Impact on the Eco-Epidemiological Model's Dynamics
...Show More Authors

Due to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref