The first aim in this paper is to introduce the definition of fuzzy absolute value on the vector space of all real numbers then basic properties of this space are investigated. The second aim is to prove some properties that finite dimensional fuzzy normed space have.
In this paper we have studied Jordan left derivation of a ٢-torsion free ring which
has a commutator left non- zero divisor and we initiate the study of generalized
Jordan left derivation of a ٢-torsion free ring, which has a commutator left non- zero
divisor.
Bacterial vaginosis (BV) is one of the most common genital infections among women in the childbearing age. Many novel, fastidious and uncultivated bacterial species are related with BV. These are called bacterial vaginosis associated bacteria (BVAB), present in trace amount and have a significant role in the infection. A total of 80 vaginal swabs were obtained from 80 pregnant and non-pregnant women. Samples were collected from different hospitals in Baghdad city and Al-Kut city.
Clinically, 60 sample among 80 were gave positive results depending on Nugent score and Amsel criteria ,the Bacteriologicall test showed the percentages of gram negative bacteria (E.coli ,K.pneumoniae, P.mirabilis, Ps.aeruginosaand A. baumanniiwere) were (38.
According to the wide appearance of Dedekind sums in different applications on different subjects, a new approach for the equivalence of the essential and sufficient condition for ( ) ( ) in and ( ) ( ) in where ( ) Σ(( ))(( )) and the equality of .two .Dedekind sums with their connections is given. The conditions for ( ) ( ) in which is equivalent to ( )– ( ) in were demonstrated with condition that of does not divide . Some applications for the important of Dedekind sums were given.
The discrete cosine transform (DCT) is a method for converting a signal into
plain frequency components. It is extensively used in image compression. In this
paper a new technique is proposed, namely SRLE (Sliding Run Length Encoding)
which is based on a lossy compression, and used to enhance image data
compression.
Image quality is measured impartially, using peak signal-to-noise ratio (PSNR) or
picture quality scale, and individually using perceived image quality with
compression factor (CF) being the main theme of this paper, taking into
consideration the preservation of well PSNR outputs.
The performance of DCT compression generally degrades low bit-rates mainly
because of the underly
This study aimed to isolate salmonella bacteria from the goats in the four
goverenent in central Iraq (Babylon, Karbala, Najaf, Baghdad), where the number of
animals examined 710 head goats in the fields and slaughter houses, 350 samples of
feces from 350 animals from the
fields while the number of animals at slaughter houses 360 collected from them
360 fecal samples and 1440 samples from different organs (the gall bladder , the
intestine, mesenteric lymph nodes and spleen) for the purpose of bacterial isolation
serological diagnosis.
fifty one (51) Salmonella isolates were isolated from the feces and organs at a
percentage (2.37%), and was returning to the four serotypes (S.hato, S.typhimuriu
The results revealed the reduction effect of Mitotic Index and Blast Index by
higher concentration after 1 hr. exposure time significantly but all of the lower
concentration showed none significant changes on them. The same result was
indicated when cells treated with exposure 10μg/ml of extract for 48h; BI was
decrease. The extract has no toxic effect on lymphocyte at concentration 1 and
10μg/ml for 48h of treatment. After 72h of exposure time BI was significantly
decreased while different values in MI were seen when cells treat with 1-100 μg/ml
of extract. Moreover mitosis was inhibited at high concentrations of extract
Mathematical integration techniques rely on mathematical relationships such as addition, subtraction, division, and subtraction to merge images with different resolutions to achieve the best effect of the merger. In this study, a simulation is adopted to correct the geometric and radiometric distortion of satellite images based on mathematical integration techniques, including Brovey Transform (BT), Color Normalization Transform (CNT), and Multiplicative Model (MM). Also, interpolation methods, namely the nearest neighborhood, Bi-linear, and Bi-cubic were adapted to the images captured by an optical camera. The evaluation of images resulting from the integration process was performed using several types of measures; the first type depend
... Show MoreThe increase in the use of thyme in Iraq and neighboring countries, which may
be result in serious side effects necessitate the demand for testing different
concentrations of thyme extract (500,750,1000) mg/kg of body weight on rats to be
given either by injection or feeding grinded dried thyme leaves added to pellets
(50,100,150) g /kg of pellet in of different periods , (10,20,30) days for injection
and feeding 2 times weekly. Thyme extracts leaves effects on RBCs, WBCs and
Differential WBCs counts were measured. statistical analysis showed significance
increase difference (P≤0.05) in RBCs, WBCs and Lymphocyte, Nutrophile and
Monocyte counts and decrease in Eosinphil counts in rats treated with 1000 mg of
t
Multiple applications use offline handwritten signatures for human verification. This fact increases the need for building a computerized system for signature recognition and verification schemes to ensure the highest possible level of security from counterfeit signatures. This research is devoted to developing a system for offline signature verification based on a combination of local ridge features and other features obtained from applying two-level Haar wavelet transform. The proposed system involves many preprocessing steps that include a group of image processing techniques (including: many enhancement techniques, region of interest allocation, converting to a binary image, and Thinning). In feature extraction and
... Show MoreExciton model describes the excitation of particles in pre-equilibrium region of nuclear reaction by exciton. In pre-equilibrium region there is a small probability for occurring emission and the number of excitons be the probability of the emission of it possible more is called most probable exciton number MPEN. In this paper the MPEN formula was derived for protons and neutrons separately and so MPEN formula derived with taking into account the non equidistant spacing between the energy states. The MPEN was studied with the mass number where it is noticed the MPEN increases with increasing the mass number. Also, MPEN studied for different isotopes of Al, the MPEN increases with increasing mass number of isotopes. MPEN for neutron is co
... Show MoreThe energy backpropagation algorithm (EBP) used the net, which contains two
nodes of input layer, hidden layer and output layer. In this paper, we will use a net,
which contains three nodes and four nodes of input layer, hidden layer and output
layer. This study will compares among times of the learning, times of the
identification and times of the converging by using the three nets (2, 3 and 4 nodes)
in the Energy back propagation Algorithm. The results of experiments show the nets
which contain three nodes and four nodes have better performance for time of the
learning than the net which contains two nodes, while the net which contains two
nodes has better performance for the time of identificati
Mining for associations rules between items in large transactional distributed databases is a central problem in the field of knowledge discovery. When distributed databases are merged at single machine to mining knowledge it will required large capacity of storage, long execution time in addition to that; transferring a huge volume of data over network might take extremely much time and also require an unbearable financial cost.
In this paper proposed algorithm is presented toward saving communication cost
over the network, central storage cost requirements, and accelerating required
execution time. The algorithm consist of two parts: Part one: Extracting Association
Rules for Distributed Association Rules (EAR4DAR)
The objective of the work was to study the effect of several leaves defoliation : non defoliation (control D1, defoliation of lower 25%D2, upper 25%D3, lower 50% D4, upper50% D5 of plant leaves, defoliation of 25D6, 40D7, and 50%D8 of plant leaves along the stem, and defoliation of all plant leaves. That took place at two stages of plant growth: vegetative growth to head (R1), and the period from heads opening to flowering (R4-R5), on growth of sunflower plant var.Euroflor in gypsyferous soil. The experiment was designed according to RCBD with three replications. Agricultural practices were made according to recommendations.
Results indicated that defoliation of the lower 50% of plant leaves reduced leaf content of chl. a and total
The depth conversion process is a significant task in seismic interpretation to establish the link between the seismic data in the time domain and the drilled wells in the depth domain. To promote the exploration and development of the Subba oilfield, more accurate depth conversion is required. In this paper, three approaches of depth conversions: Models 1, 2, and 3 are applied from the simplest to the most complex on Nahr Umr Reservoir in Suba oilfield. This is to obtain the best approach, giving less mistakes with the actual depth at well locations and good inter/extrapolation between or away from well controls. The results of these approaches, together with the uncertainty analysis provide a reliable velocity model
... Show MoreIn this paper, we extend the work of our proplem in uniformly convex Banach spaces using Kirk fixed point theorem. Thus the existence and sufficient conditions for the controllability to general formulation of nonlinear boundary control problems in reflexive Banach spaces are introduced. The results are obtained by using fixed point theorem that deals with nonexpanisive mapping defined on a set has normal structure and strongly continuous semigroup theory. An application is given to illustrate the importance of the results.
Proliferation of network systems and growing usage of Internet make network
security issue to be more important. Intrusion detection is an important factor in keeping
network secure. The main aim of intrusion detection is to classify behavior of a system
into normal and intrusive behaviors. However, the normal and the attack behaviors in
networks are hard to predict as the boundaries between them cannot be well distinct.
This paper presents an algorithm for intrusion detection that combines both fuzzy C
Means (FCM) and FCM for symbolic features algorithms in one. Experimental results
on the Knowledge Discovery and Data Mining Cup 1999 (KDD cup 99) intrusion
detection dataset show that the average detection rate of
In this paper we study a spectral characterization of the Taylor-Browder spectrum for
a double commuting n − tuple of totally θ −operators, and study relation between the
Taylor- Weyl spectrum, Taylar- Browder spectrum, joint-Weyl spectrum, and joint-
Browder spectrum for commuting n − tuple of totally θ −operators. Also we study a
spectral characterization of the Taylor-Browder spectrum for a doubly commuting
n − tuple of posinormal operators.
Interleukin-35 (IL-35) is a new member of IL-12 family of cytokines, and its role in pathogenesis of hepatitis B virus (HBV) infection has been recently suggested. Accordingly, a case-control study was conducted during June - October 2018 to determine IL-35 serum level in Iraqi patients with chronic HBV infection. The results revealed that IL-35 level was significantly decreased in patients as compared to control (163 vs. 301 pg/ml; p < 0.001). However, such decreased level was more pronounced in patients at the age groups < 40 and 40 – 50 years (165 and 145 pg/ml, respectively) as compared to the corresponding age groups in control (482 and 234 pg/ml, respectively). In the case of gender groups, both male
... Show MoreIn this study, carbon nanotubes were prepared using a pure chemical method modified similar to the Hummers method with simple changes in the work steps. The carbon nanotubes were then coated and reduced on copper and aluminum metals using the electrodeposition method (EDP) for corrosion protection application in seawater medium (NaCl 3.5%) at four different temperatures: 20, 30, 40, and 50 °C, which were studied using three electrode potentiostats. All corrosion measurements, thermodynamics, and kinetics parameters were nominated from Tafel plots. The films deposited by the carbon nanotubes were examined by the SEM technique, and this technique showed the formation of carbon nanotubes.
Uranium concentration was estimated in urine samples of three age groups, G1≤ 30 years, n=28, G2 age range of 31-40 years, n=28, and G3 of age > 40 years, n=32, using two types of detectors CR-39 and LR-115 solid-state nuclear track detector (SSNTD) for results comparison.
Results showed that uranium mean level values for CR-39 were 1.961 ±0.08 µg/L, 1.810 ±0.09 µg/L and 1.814 ±0.076 µg/L for G1, G2 and G3 respectively, while the mean values of uranium concentration using LR-115 were 0.972 ±0.07 µg/L, 0.922 ±0.07 µg/L and 1.018 ±0.08 µg/L in G1, G2 and G3 respectively, with significant statistical difference betw
... Show MoreThe time fractional order differential equations are fundamental tools that are used for modeling neuronal dynamics. These equations are obtained by substituting the time derivative of order where , in the standard equation with the Caputo fractional formula. In this paper, two implicit difference schemes: the linearly Euler implicit and the Crank-Nicolson (CN) finite difference schemes, are employed in solving a one-dimensional time-fractional semilinear equation with Dirichlet boundary conditions. Moreover, the consistency, stability and convergence of the proposed schemes are investigated. We prove that the IEM is unconditionally stable, while CNM is conditionally stable. Furthermore, a comparative study between these two s
... Show MoreComputer science has evolved to become the basis for evolution and entered into all areas of life where the use of computer has been developed in all scientific, military, commercial and health institutions. In addition, it has been applied in residential and industrial projects due to the high capacity and ability to achieve goals in a shorter time and less effort. In this research, the computer, its branches, and algorithms will be invested in the psychological field. In general, in psychological fields, a questionnaire model is created according to the requirements of the research topic. The model contains many questions that are answered by the individuals of the sample space chosen by the researcher. Often,
... Show MoreThe Tigris River in Iraq is of highly meandering in several of its parts. So, the largest meandering inside Baghdad City, is in Al-Jadriyah. During its course, the Tigris Riverbanks are facing erosion frequently due to alteration in the geomorphological and hydrological characteristics affecting the river channel. The entire length of Tigris River from the northern entrance of Baghdad to the convergence with Diyala River at southern of Baghdad is about 49 km length. The Tigris River is suffering from the erosion, deposition, and migration conditions. The river migration was found as maximum in the left bank at the side of the University, and lesser in the right bank in the opposite side, Dora. The aim of this study is to measure the magn
... Show MoreAntimony selenide substituted with Sb0.4Se0.6 and doped with zinc at three doping ratios (x=0, 0.01 and 0.03) was prepared via the solid state reaction method. The three prepared compositions were reacted thermally at 400 °C for 3 h. The structure of specimens was characterised via X-ray powder diffractometer to obtain the type of crystalline structure and lattice parameters of the prepared specimens, which showed a polycrystalline, orthorhombic structure. Optical characterisation was then achieved via UV-visible spectroscopy to exhibit the transmittance and reflectance spectra and estimate the band gap values of the prepared compositions. The samples showed high abs
... Show MoreLet be a commutative ring with 1 and be a left unitary . In this paper, the generalizations for the notions of compressible module and retractable module are given.
An is termed to be semi-essentially compressible if can be embedded in every of a non-zero semi-essential submodules. An is termed a semi-essentially retractable module, if for every non-zero semi-essentially submodule of an . Some of their advantages characterizations and examples are given. We also study the relation between these classes and some other classes of modules.
Let R be an associative ring with identity, and let M be a unital left R-module, M is called totally generalized *cofinitely supplemented module for short ( T G*CS), if every submodule of M is a Generalized *cofinitely supplemented ( G*CS ). In this paper we prove among the results under certain condition the factor module of T G*CS is T G*CS and the finite sum of T G*CS is T G*CS.
Let M be an R-module, where R be a commutative;ring with identity. In this paper, we defined a new kind of submodules, namely; ET-coessential and ET-Coclosed submodules of M. Let T be a submodule of M. Let K H M, K is called ET-Coessential of H in M (K⊆ET.ce H), if . A submodule H is called ET- coclosed in M of H has no proper coessential submodule in M, we denote by (K⊆ET.cc H) , that is, K⊆ET.ce H implies that K = H. In our work, we introduce;some properties of ET-coessential and ET-coclosed submodules of M.
Thirty- five vaginal swab samples were obtained from women vagina.All samples
were subjected to conventional morphological and cultural characteristics, isolates
distributed between Lactobacillus acidophillus(23)and Lactobacillus fermentum (12).
Antibacterial activities were done by well diffusion and blank disk method. The
Lactobacillus was used as aprobiotic treatment against bacteriaisolates from vagina
.The isolated bacteria had strong activity against indicator strains.The results showed
that Lactobacillus which was isolated from vagina by well diffusion method was
effective against pathogenic isolates more than the Lactobacillus isolated by blank
disc method , the highs inhibitory effect of Lactobacillus iso