The attribute quality control charts are one of the main useful tools to use in control of quality product in companies. In this paper utilizing the statistical procedures to find the attribute quality control charts for through fuzzified the real data which we got it from Baghdad Soft Drink Company in Iraq, by using triangular membership function to obtain the fuzzy numbers then employing the proposed ranking function to transform to traditional sample. Then, compare between crisp and fuzzy attribute quality control.
In this paper, the C̆ech fuzzy soft closure spaces are defined and their basic properties are studied. Closed (respectively, open) fuzzy soft sets is defined in C̆ech fuzzy-soft closure spaces. It has been shown that for each C̆ech fuzzy soft closure space there is an associated fuzzy soft topological space. In addition, the concepts of a subspace and a sum are defined in C̆ech fuzzy soft closure space. Finally, fuzzy soft continuous (respectively, open and closed) mapping between C̆ech fuzzy soft closure spaces are introduced. Mathematics Subject Classification: 54A40, 54B05, 54C05.
In this paper the chain length of a space of fuzzy orderings is defined, and various properties of this invariant are proved. The structure theorem for spaces of finite chain length is proved. Spaces of Fuzzy Orderings Throughout X = (X,A) denoted a space of fuzzy orderings. That is, A is a fuzzy subgroup of abelian group G of exponent 2. (see [1] (i.e. x 2 = 1,  x  G), and X is a (non empty) fuzzy subset of the character group ï£ (A) = Hom(A,{1,–1}) satisfying: 1. X is a fuzzy closed subset of ï£ (A). 2.  an element e  A such that ï³(e) = – 1  ï³ ïƒŽ X. 3. Xïž :={a  A\ ï³(a) = 1  ï³ ïƒŽ X} = 1. 4. If f and g are forms over A and if x  D(
... Show MoreThe main aim of this paper is to introduce the concept of a Fuzzy Internal Direct Product of fuzzy subgroups of group . We study some properties and prove some theorems about this concept ,which is very important and interesting of fuzzy groups and very useful in applications of fuzzy mathematics in general and especially in fuzzy groups.
In this work, a novel technique to obtain an accurate solutions to nonlinear form by multi-step combination with Laplace-variational approach (MSLVIM) is introduced. Compared with the traditional approach for variational it overcome all difficulties and enable to provide us more an accurate solutions with extended of the convergence region as well as covering to larger intervals which providing us a continuous representation of approximate analytic solution and it give more better information of the solution over the whole time interval. This technique is more easier for obtaining the general Lagrange multiplier with reduces the time and calculations. It converges rapidly to exact formula with simply computable terms wit
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreWA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreTI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreThis paper deals with one of important topics that serve the art movement music, which is looking at the stairs of Arab music in the process of reaching to the directory musical on the subject of so-called (Photo by stairs music) and that by comparing the method used previously and the proposed rules reached by the researcher and received the patent invention, the method is easier for the musician and the author in a directory of peace Arab music when used on grades and half grades voice, and to achieve its objectives researcher dealt with the problem that is determined by the multitude of stairs leading Arab and the difficulty of keeping its catalog of music, and for being an anchor and pillar of the music was taken up and put her impor
... Show MoreThis research deals with a very important subject as it tries to change the theoretical and scientific heritage and some professional rules adopted in the newsroom. Most media students have difficulties in writing news for press correctly. The researcher tries to identify the compatibility of what is published in local news agencies with professional and academic standards.
The research finds detailed editorial rules for a number of news formats which will play an important role in writing news for press easily, especially for the beginners and newcomers. Also, it discovers a new fact denying the beliefs of some researchers and writers in not having news conclusion in news edited according to the inverted pyramid pattern.
The re