In this paper, we introduce a new type of functions in bitopological spaces, namely, (1,2)*-proper functions. Also, we study the basic properties and characterizations of these functions . One of the most important of equivalent definitions to the (1,2)*-proper functions is given by using (1,2)*-cluster points of filters . Moreover we define and study (1,2)*-perfect functions and (1,2)*-compact functions in bitopological spaces and we study the relation between (1,2)*-proper functions and each of (1,2)*-closed functions , (1,2)*-perfect functions and (1,2)*-compact functions and we give an example when the converse may not be true .
In this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given
Some experiments need to know the extent of their usefulness to continue providing them or not. This is done through the fuzzy regression discontinuous model, where the Epanechnikov Kernel and Triangular Kernel were used to estimate the model by generating data from the Monte Carlo experiment and comparing the results obtained. It was found that the. Epanechnikov Kernel has a least mean squared error.
The research dealt with the effectiveness of prediction and foresight in design as a phenomenon that plays a role in the recipient's engagement with the design, as it shows the interaction between the recipient and the interior space. The designer is keen to diversify his formal vocabulary in a way that secures visual values that call for aesthetic integration, as well as securing mental and kinetic behavioral understanding in the interior space.
As the designer deals with a three-dimensional space that carries many visual scenes, the designer should not leave anything from it without standing on it with study and investigation, and puts the user as a basic goal as he provides interpretive data through prediction and foresight that le
In this study, we derived the estimation for Reliability of the Exponential distribution based on the Bayesian approach. In the Bayesian approach, the parameter of the Exponential distribution is assumed to be random variable .We derived posterior distribution the parameter of the Exponential distribution under four types priors distributions for the scale parameter of the Exponential distribution is: Inverse Chi-square distribution, Inverted Gamma distribution, improper distribution, Non-informative distribution. And the estimators for Reliability is obtained using the two proposed loss function in this study which is based on the natural logarithm for Reliability function .We used simulation technique, to compare the
... Show MoreThe new azo dye was synthesized via the reaction of the diazonium salt form of 3-aminophenol with 2-hydroxyquinoline. This dye was then used to access a series of complexes with the chlorides of manganese, iron, zinc, cadmium, and vanadium sulfate. The prepared ligand and its complexes were characterized by FT-IR spectroscopy, UV-visible spectroscopy, mass spectrometry, thermogravimetric analysis, differential scanning calorimeter, and microelemental analysis. Conductivity, magnetic susceptibility, metal content, and chlorine content of the complexes were also measured. The ligand and cadmium complex were identified using1H NMR and 13C NMR spectroscopy. The results showed that the shape of the ligand is a trigonal planner, and the c
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
The current research studies the aesthetic framework for the dialectical development of the functions of the contemporary theater director in an aesthetic approach to the mechanisms of functional overlap between the dramaturgy and direction functions, and scenography and direction, the detection of the controversial structure of that overlap, and what can be summed up in the following question: (what are the aesthetic approaches of the dialectical development in the function of the contemporary theatre director?). The research is determined by a pivotal aim which is (knowing the aesthetic nature of the dialectical development in
The current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a
... Show MoreStudies from our laboratory have shown that Δ9-Tetrahydrocannabinol (THC), an ingredient found in marijuana plant Cannabis sativa, can attenuate acute lung injury induced by Staphylococcus enterotoxin B (SEB). In the current study, we investigated the role of THC on the metabolism of SEB-activated lymphocytes. To this end, we determined metabolic potential of SEB-activated lymphocytes treated with vehicle or THC by performing the Cell Mito Stress Test. The oxygen consumption rate (OCR) in THC-treated cells was decreased when compared to vehicle-treated group whereas the extracellular acidification rate (ECAR) was similar in both the groups. Specifically, electron transport chain inhi