The definition of semi-preopen sets were first introduced by "Andrijevic" as were is defined by :Let (X , ï´ ) be a topological space, and let A ⊆, then A is called semi-preopen set if ⊆∘ . In this paper, we study the properties of semi-preopen sets but by another definition which is equivalent to the first definition and we also study the relationships among it and (open, α-open, preopen and semi-p-open )sets.
A pulsed (TEA-0O2) laser was used to dissociate molecules of silane ethylene (C2I-14) and ammonia (NH3) gases, through collision assisted multiple photon dissociation (MPD) to deposit(SiC i_xNx) thin films, where the X-values are 0, 0.13 and 0.33, on glass substrate at T,----648 K. deposition rate of (0.416-0.833) nm/pulse and thickness of (500-1000)nm .Fourier transform infrared spectrometry (FT-IR) was used to study the nature of the chemical bonds that exist in the films. Results revealed that these films contain complex networks of the atomic (Si, C, and N), other a quantity of atomic hydrogen and chemical bonds such as (Si-N, C-N, C-14 and N-H).Absorbance and Transmittance spectra in the wavelength range (400-1100) nm were used to stud
... Show MoreThe child realize that the meals time provide golden opportunities to get the attention the child needs. However, many difficulties that may appear about eating food can be avoided, if the family used the right way in dealing with this problem. The study aims, in this case, at searching for the reasons that lies behind the child's obstinacy in eating his food and the attempt to study some variables that is related to the research topic.
The results are summed up as follows:
- The number of the sample children is 3 of both sexes between the ages of 3 to 6 years
Began the process of re-engineering processes in the private sector as a way to assist organizations in re-thinking how to run the business in order to improve production processes and reduce operational cost, to get to compete on a global level. That was a major restructuring by further evolution in the use of technology to support innovative operations.
Entered the technology in all areas of life and different regulations, This led to use as a change in all aspects The companies achieved success and progress today through the use of resources so as to ensure the wishes of the customers and their needs, and the requirements of the market primarily, Which is reflected on the basis of building strate
... Show MoreApple vinegar has many uses that include burn and wound healing and as an antimicrobial agent against different microorganisms, but not as a solvent. Therefore, this study aimed to use commercial apple vinegar as solvent to the plants of roselle (Hibiscus sabdariffa), green tea (Camellia sinensis), and clove (Syzygium aromaticum). The effects of apple-vinegar extracts of these plants were compared with those of aqueous and ethanolic extracts against biofilm formation by Candida genus. Clove vinegar extract demonstrated antibiofilm activity against C. albicans, alone (2.4907± 0.382) or in combination with the antifungal agents fluconazole (1.689±0.33), nystati
... Show MoreIn this study new derivatives of O-[2-{''2-Substituted Aryl (''1,''3,''4 thiadiazolyl) ['3,'4-b]-'1,'2,'4- Triazolyl]-Ethyl]-p- chlorobenzald oxime (6-11)have been synthesized from the starting material p-chloro – E- benzaldoxime 1.Compound 2 was synthesized by the reaction of p-chloro – E- benzaldoxime with ethyl acrylate in basic medium. Refluxing compound 2 with hydrazine hydrate in ethanol absolute afforded 3. Derivative 4 was prepared by the reaction of 3 with carbon disulphide, treated of compound 4 with hydrazine hydrate gave 5. The derivatives (6-11) were prepared by the reaction of 5 with different substitutesof aromatic acids. The structures of these compounds were characterized from their melting points, infrared spectroscopy
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More