In this paper, we introduce the notation of the soft bornological group to solve the problem of boundedness for the soft group. We combine soft set theory with bornology space to produce a new structure which is called soft bornological group. So that both the product and inverse maps are soft bounded. As well as, we study the actions of the soft bornological group on the soft bornological sets. The aim soft bornological set is to partition into orbital classes by acting soft bornological group on the soft bornological set. In addition, we explain the centralizer, normalizer, and stabilizer in details. The main important results are to prove that the product of soft bornological groups is soft bornological group and the action for different elements are the same actions.
End Stage Renal Disease is a well-known global public health problem. Maintenance hemodialysis is considered a life-saving treatment for patients with such disease. This treatment method that requires patients to be adherent to hemodialysis attendance, dietary and fluid recommendations as well as adherence to prescribed medications to ensure success. The aim of the current study was to assess adherence, perception, and counseling among hemodialysis patients to different modalities of treatment (fluid restriction, dietary recommendations, medications, and hemodialysis schedules). A cross-sectional study carried out on hemodialysis patients who attended to the dialysis centers at al- Karama teachi
... Show MoreAs a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreThe Internet of Things (IoT) has great importance in the medical industry. The creation of intelligent sensors, intelligent machines, and superior algorithms for lightweight communication made it feasible to connect medical equipment in order to monitor biomedical signals and also to detect illnesses in patients without human intervention. This new IoT and medical equipment connection is called IoMT. This IoMT model is most adapted to this pandemic since every human being has to be interconnected and monitored via a larger communication network. Hence, this article provides an overview of remote healthcare systems, monitoring ingestible sensors, mobile health, smart hospitals, and improved chronic disease management focused on t
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreThe use of online social network (OSN) has become essential to humans' lives whether for entertainment, business or shopping. This increasing use of OSN motivates designing and implementing special systems that use OSN users' data to provide better user experience using machine learning and data mining algorithms and techniques. One system that is used extensively for this purpose is friend recommendation system (FRS) in which it recommends users to other users in professional or entertaining online social networks.
For this purpose, this study proposes a novel friend recommendation system, namely Hybrid Friend Recommendation (FR) model. The Hybrid model applies dual-stage methodology on unlabeled data of 1241 users collected fro
... Show MoreIn this work, HgBa2CaCu2-xSbxO8+δ compounds with (x = 0.2, 0.4, 0.6 and 0.8) have been prepared by the solid-state reaction method. Structural, morphological, and electrical properties were investigated using X-ray diffraction (XRD) and scanning electron microscope (SEM) techniques. Using the 4-probe technique to study the effect of antimony-substitution for Copper on the electrical properties of HgBa2CaCu2-xSbxO8+δ (Hg-1212) phase was investigated by measuring the resistivity as a function of temperature. Results indicate that the addition of antimony (Sb) increases the volume fraction of the phase and changes the superconducting transition temperature Tc of the superconductor to a normal state. The dielectric loss factor and ac
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More