Continuous functions are novel concepts in topology. Many topologists contributed to the theory of continuous functions in topology. The present authors continued the study on continuous functions by utilizing the concept of gpα-closed sets in topology and introduced the concepts of weakly, subweakly and almost continuous functions. Further, the properties of these functions are established.
Let
be a dynamical system,
is said to be topological transitive if for every pair of non-empty open set
, there exists
such that
. We introduce and investigate a new definition of topological transitive by using the nation N-open subset and we called N-transitive and prove the equivalent definitions of this new definition.
This study included isolation and characterization of extremely halophilic bacteria from Al-Massab Al-Aam region in South of Iraq Fifty isolates were identified by using numerical taxonomy 40 strains belonged to the genus Halobacterium which inclucted Hb. halobium Hb. cutirubrum Hb. salinarium Hb. saccharovorum Hb. valismortis and Hb. volcanii. Ten strains belonged to the genus Halococcus which included Hc. morrhuae Hc. saccharolyticus. Growth curves were sensitive mutants determined for wild type and salt Generation time in logarthmic phase was measured and found to be (10.37 2hr 7 0.59) for Hb. salinarium / 18 (6.490 hr 0.24) for Hb. cutirubrum / 32, (6.700 hr + 0.488) for Hb. valismortis / 20, (11.243 hr + 0.96) for Hb. volcanii / 7. (7
... Show MoreBackground: The present in-vitro study was undertaken to evaluate and compare fracture resistance of weakened endodontically treated premolars with class II MOD cavities restored with different bulk fill composite restorations (EverX posterior, Alert, Tetric EvoCeram Bulk Fill, and SDR). The type and mode of fracture were also assessed for all the experimental groups. Materials and Method: Forty-eight human adult maxillary premolar teeth were selected for this study. Standardized extensive class II MOD cavities with endodontic treatment were prepared for all teeth, except those that were saved as intact control. The teeth were divided into six groups of eight teeth each (n=8): (Group 1) intact control group, (Group 2) unrestored teeth with
... Show MoreThe wear behavior of alumina particulate reinforced A332 aluminium alloy composites produced by a stir casting process technique were investigated. A pin-on-disc type apparatus was employed for determining the sliding wear rate in composite samples at different grain size (1 µm, 12µm, 50 nm) and different weight percentage (0.05-0.1-0.5-1) wt% of alumina respectively. Mechanical properties characterization which strongly depends on microstructure properties of reinforcement revealed that the presence of ( nano , micro) alumina particulates lead to simultaneous increase in hardness, ultimate tensile stress (UTS), wear resistances. The results revealed that UTS, Hardness, Wear resistances increases with the increase in the percentage of
... Show MoreThis research work aims to the determination of molybdenum (VI) ion via the formation of peroxy molybdenum compounds which has red-brown colour with absorbance wave length at 455nm for the system of ammonia solution-hydrogen peroxide-molybdenum (VI) using a completely newly developed microphotometer based on the ON-Line measurement. Variation of responses expressed in millivolt. A correlation coefficient of 0.9925 for the range of 2.5-150 ?g.ml-1 with percentage linearity of 98.50%. A detection limit of 0.25 ?g.ml-1 was obtained. All physical and chemical variable were optimized interferences of cation and anion were studied classical method of measurement were done and compared well with newly on-line measurements. Application for the use
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreIn this study the Sub family of Nomiinae Robertson,1904 (Hyminoptera: Halictidae) was revised There were five species registered in our investigation:
There are many aims of this book: The first aim is to develop a model equation that describes the spread of contamination through soils which can be used to determine the rate of environmental contamination by estimate the concentration of heavy metals (HMs) in soil. The developed model equation can be considered as a good representation for a problem of environmental contamination. The second aim of this work is to design two feed forward neural networks (FFNN) as an alternative accurate technique to determine the rate of environmental contamination which can be used to solve the model equation. The first network is to simulate the soil parameters which can be used as input data in the second suggested network, while the second network sim
... Show More