Human interest in negative space has existential roots, in addition to its cognitive value of things. In the environment, it includes space features from facts and activities, as negative space plays an active role in the field of visual perception, and this value comes from the need to absorb vital relationships in its environment, Man represents the positive part of negative space through his presence in this environment, and therefore this is reflected in the design of its types and the function of each element in the design, for the real effectiveness that the elements gain and their impact comes through the negative space that surrounds them and organizes their relationships with other elements, that the orientation is distributed a
... Show MoreThe goal of the research is to introduce new types of maps called semi totally Bc-continuous map and totally Bc-continuous map furthermore, study its properties. Additionally, we study the relationship of these functions and other known mappings are discussed.
The quote of a Canadian communication scientist (Marshall McLuhan) (“The world has become an electronic village”) has become an archaic information compared to the great and rapid development of communication in the last two decades of the 20th century and what will happen later in the 21st century, to the extent that the world is called, thanks to the internet, a “Small screen” and this fact is a sign of the great progress that has been made in this field. As for the other statement of the Canadian communication scientist mentioned before “the medium itself, is the message”, it has been renewed and developed in its meaning and it’s purpose. Each new technical development in the means of communication necessarily means a me
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreIn this study, the concept of fuzzy α-topological vector space is introduced by using the concept fuzzy α-open set , some properties of fuzzy α-topological vector spaces are proved .We also show that the space is -space iff every singleton set is fuzzy α- closed .Finally, the convex property and its relation with the interior points are discussed.
It is shown that if a subset of a topological space (χ, τ) is δ-semi.closed, then it is semi.closed. By use this fact, we introduce the concept regularity of a topological space (χ, τ) via δ-semi.open sets. Many properties and results were investigated and studied. In addition we study some maps that preserve the δ-semi.regularity of spaces.
In this work we explain and discuss new notion of fibrewise topological spaces, calledfibrewise soft ideal topological spaces, Also, we show the notions of fibrewise closed soft ideal topological spaces, fibrewise open soft ideal topological spaces and fibrewise soft near ideal topological spaces.
In this paper the chain length of a space of fuzzy orderings is defined, and various properties of this invariant are proved. The structure theorem for spaces of finite chain length is proved. Spaces of Fuzzy Orderings Throughout X = (X,A) denoted a space of fuzzy orderings. That is, A is a fuzzy subgroup of abelian group G of exponent 2. (see [1] (i.e. x 2 = 1,  x  G), and X is a (non empty) fuzzy subset of the character group ï£ (A) = Hom(A,{1,–1}) satisfying: 1. X is a fuzzy closed subset of ï£ (A). 2.  an element e  A such that ï³(e) = – 1  ï³ ïƒŽ X. 3. Xïž :={a  A\ ï³(a) = 1  ï³ ïƒŽ X} = 1. 4. If f and g are forms over A and if x  D(
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More