In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.
The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
The current research aims to assess the Brief Book of the Modern and Contemporary History of Asia from the perspective of the students in the Department of History, University of Baghdad. The study is carried out in Iraq and the research group has included students of the Department of History in the College of Education--Ibn Rushd and the College of Education for Women- University of Baghdad. The chosen sample of the assigned research consisted of (72) students from third stage in the Department of History, which equals (0.38%) of the total group members amounted (188) female and male students representing (40) students from the College of Education--Ibn Rushd, and 32 students from
... Show MoreThe digital multimedia systems become standard at this time because of their extremely sensory activity effects and also the advanced development in its corresponding technology. Recently, biological techniques applied to several varieties of applications such as authentication protocols, organic chemistry, and cryptography. Deoxyribonucleic Acid (DNA) is a tool to hide the key information in multimedia platforms.
In this paper, an embedding algorithm is introduced; first, the image is divided into equally sized blocks, these blocks checked for a small amount color in all the separated blocks. The selected blocks are used to localize the necessary image information. In the second stage, a comparison is between the initial image pixel
The water supply network inside the building is of high importance due to direct contact with the user that must be optimally designed to meet the water needs of users. This work aims to review previous research and scientific theories that deal with the design of water networks inside buildings, from calculating the amount of consumption and the optimal distribution of the network, as well as ways to rationalize the use of water by the consumer. The process of pumping domestic water starts from water treatment plants to be fed to the public distribution networks, then reaching a distribution network inside the building till it is provided to the user. The design of the water supply network inside the building is
... Show MoreEvery body has a size and mass that distinguishes it from others and makes it different from others. Some of these bodies are huge and large in size, and some are small and light in weight. Among these masses and bodies are some that are dealt with by their size and weight, each according to its quantity, weight, and cheapness. This is why they created quantities by which these weights and quantities could be estimated, so they used measures and weights for that. Objectives: The research aims to know some measures and weights, such as the wife’s maintenance, the amount of zakat, etc.I found it to be a widely spread topic, and widely used in the folds of jurisprudence. During my reading of jurisprudence books, I found jurists using many qu
... Show MoreDNA methylation is one of the main epigenetic mechanisms in cancer development and progression. Aberrant DNA methylation of CpG islands within promoter regions contributes to the dysregulation of various tumor suppressors and oncogenes; this leads to the appearance of malignant features, including rapid proliferation, metastasis, stemness, and drug resistance. The discovery of two important protein families, DNA methyltransferases (DNMTs) and Ten-eleven translocation (TET) dioxygenases, respectively, which are responsible for deregulated transcription of genes that play pivotal roles in tumorigenesis, led to further understanding of DNA methylation-related pathways. But how these enzymes can target specific genes in different malignancies;
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show MoreThis paper intends to initiate a new type of generalized closed set in topological space with the theoretical application of generalized topological space. This newly defined set is a weaker form than the -closed set as well as -closed set. Some phenomenal characterizations and results of newly defined sets are inculcated in a proper manner. The characteristics of normal spaces and regular spaces are achieved in the light of the generalized pre-regular closed set.