Jordan curve theorem is one of the classical theorems of mathematics, it states the following : If is a graph of a simple closed curve in the complex plane the complement of is the union of two regions, being the common boundary of the two regions. One of the region is bounded and the other is unbounded. We introduced in this paper one of Jordan's theorem generalizations. A new type of space is discussed with some properties and new examples. This new space called Contractible -space.
An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the avera
... Show MoreIndia is today the largest democratic state in the Third World and has been able to maintain its national unity in the near future. The history of Indian civilization is more than 5,000 years old. It has achieved its heritage, culture, philosophy, traditions, national unity and unity and has taken its place among nations seeking progress and progress. Which are still visible to the present day, because of their history of civilization and achievements, and the fusion of cultures of invading peoples over the centuries with the culture of diverse Indian society, but despite being a secular state, Has put into place through its governments various forms of exclusion and marginalization towards the people of India, especially Muslims, and th
... Show MoreEstimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show MoreAnabolic androgenic steroids (AAS) are man-made derivatives of the male sex hormone testosterone, originally designed for therapeutic uses to provide higher anabolic potency with lower androgenic effects. Increasing numbers of young athletes are using these agents illicitly to enhance physical fitness, appearance, and performance despite their numerous side effects and worldwide banning. Today, their use remains one of the main health problems in sports because of their availability and low price. The present study focuses on investigating the adverse effects of anabolic androgenic steroid abuse on sex hormones, liver and renal function tests, fasting glucose levels and lipid metabolism in Iraqi male recreational bodybuilders
... Show MoreThe study included a statement toxicity of some heavy metals individually and collectively and the existence of plant nutrients in the center Agirenk bluish green moss growth and Askhaddm biomass as an indicator of the study, in addition to portability moss on the accumulation of the metal
Necessary and sufficient conditions for the operator equation I AXAX n*, to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show More