The aim of this paper is to introduce and study the concept of SN-spaces via the notation of simply-open sets as well as to investigate their relationship to other topological spaces and give some of its properties.
After the tremendous development witnessed by the world of communications at the beginning of the third millennium, the activities that are performed through cyberspace have increased, and its importance has therefore increased, and the risks to which this space is exposed have increased, and in view of the global trend towards regulating this space and the practices that take place through it, as well as finding legal and technical ways to secure it. And to secure the services that are provided through it, it was necessary to determine the nature of this space and therefore its security. In order to create an appropriate theoretical framework around it that may be used if the Iraqi legislator goes towards organizing this space and secur
... Show MoreThe study of entry and reentry dynamics for space vehicles is very important, particularly for manned vehicles and vehicles which is carry important devices and which can be used again. There are three types for entry dynamic, ballistics entry, glide entry and skip entry. The skip entry is used in this work for describing entry dynamics and determining trajectory. The inertia coordinate system is used to derive equations of motion and determines initial condition for skip entry. The velocity and drag force for entry vehicle, where generate it during entry into earth’s atmosphere are calculated in this work. Also the deceleration during descending and determining entry angles, velocities ratio and altitude ratio have been studied. The c
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
In this paper, we will introduce a new concept of operators in b-Hilbert space, which is respected to self- adjoint operator and positive operator. Moreover we will show some of their properties as well as the relation between them.
The article critically analyzes traditional translation models. The most influential models of translation in the second half of the 20th century have been mentioned, among which the theory of formal and dynamic equivalence, the theory of regular correspondences, informative, situational-denotative, functional-pragmatic theory of communication levels have been considered. The selected models have been analyzed from the point of view of the universality of their use for different types and types of translation, as well as the ability to comprehend the deep links established between the original and the translation.
Аннотация
The purpose of this article is to partition PG(3,11) into orbits. These orbits are studied from the view of caps using the subgroups of PGL(4,11) which are determined by nontrivial positive divisors of the order of PG(3,11). The τ_i-distribution and c_i-distribution are also founded for each cap.
Group action on the projective space PG(3,q) is a method which can be used to construct some geometric objects for example cap. We constructed new caps in PG(3,13) of degrees 2, 3, 4, 7,14 and sizes 2, 4, 5, 7, 10, 14, 17, 20, 28, 34, 35, 68, 70, 85, 119, 140, 170, 238, 340, 476, 595, 1190. Then the incomplete caps are extended to complete caps.
This paper presents a newly developed method with new algorithms to find the numerical solution of nth-order state-space equations (SSE) of linear continuous-time control system by using block method. The algorithms have been written in Matlab language. The state-space equation is the modern representation to the analysis of continuous-time system. It was treated numerically to the single-input-single-output (SISO) systems as well as multiple-input-multiple-output (MIMO) systems by using fourth-order-six-steps block method. We show that it is possible to find the output values of the state-space method using block method. Comparison between the numerical and exact results has been given for some numerical examples for solving different type
... Show MoreIt is the dynamic tension between the relatively fixed built environment and the constantly changing in social life that determines the nature of urban spaces belonging to different historical periods, and considered as a tool for diagnosing transformations in urban spaces, that’s why, the characteristics of urban space became unclear between positive spaces and negative spaces, so emerged the need to study contemporary urban space belonging to the current period of time and show the most important transformations that have occurred in contemporary urban space to reach urban spaces that meet the current life requirements. Therefore, the research dealt with a study of the characteristics of contemporary urban space and the most pr
... Show MoreThe research deals with the analysis of the city's commercial center using geographic information systems to solve the problem of congestion by evaluating the efficiency and adequacy of car parking lots according to local and Arab standards. Undoubtedly, the importance of car parking areas, as they are not within the desired efficiency within the city, will lead to congestion and traffic becomes very difficult. Thus, the transportation service loses its most important characteristic, which is the ease of movement. Therefore, there has become an urgent need to study and analyze it, as well as to verify the adequacy of the service, and the amount of deficit required to be provided to solve the tra
... Show More