In this paper, some new types of regularity axioms, namely pairwise quasi-regular, pairwise semi-regular, pairwise pseudo regular and pairwise regular are defined and studied in both ech fuzzy soft bi-closure spaces ( bicsp’s) and their induced fuzzy soft bitopological spaces. We also study the relationships between them. We show that in all these types of axioms, the hereditary property is satisfied under closed fs bi-csubsp of . Furthermore, we define some normality axioms, namely pairwise semi-normal, pairwise pseudo normal, pairwise normal and pairwise completely normal in both bicsp’s and their induced fuzzy soft bitopological spaces, as well as their basic properties and the relationships between them are studied.
... Show MoreEvery finite dimensional normed algebra is isomorphic to the finite direct product of or , it is also proved these algebras are ultrasemiprime algebras. In this paper, the ultrasemiprime proof of the finite direct product of and is generalized to the finite direct product of any ultrasemiprime algebras.
In this article, we introduce and study two new families of analytic functions by using strong differential subordinations and superordinations associated with Wanas differential operator/. We also give and establish some important properties of these families.
Modern radiotherapy facilities like 3-Dimensional conformal radio therapy (3DCRT), Intensity Modulated Radiotherapy (IMRT), were recently suggested in Co-60 machine with Multi-leaf Collimator (MLC). In this study, two reference chambers NE-2571#1205 and NE2581#537 were used for absolute dose measurement in Equinox accelerator. A comparison of dose measurement by two different IAEA protocols TRS-277 and TRS-398 has been studied. Analyzing TRS-398, a common shaped empirical formula was developed for the four Co-60 units of four Medical Colleges in Bangladesh with fitting parameters. It was found that an average discrepancy in the determination of absorbed dose in water among the two different protocols TRS-277 and TRS-398 were 1
... Show MorePulsed laser ablation in liquid (PLAL) technique can produce high purity nanoparticles, it is a top-down physical method based on the principle of dividing metal ion bulk precursors into metal atoms, this method was used in this work to synthesis cobalt nanoparticals (CoPNs) with the use of Nd: YAG laser with two wavelengths (355 nm) and (532 nm) at energies (500 mJ) and (600 mJ) respectively, with number of pulses (1000,1100, 1200, 1300, and 1400) for each wavelength. The properties of the prepared nanoparticles were studied by UV-Vis, XRD, SEM with EDX, AFM, and FTIR analysis and then its antibacterial activity was studied by applying it on two types of bacteria with gram-positive (Staphylococcus aureus, Streptococc
... Show MoreSamples of the root nodules were collected to isolate different species of the genus Rhizobium from several leguminous plants; Trigonella foenum-graecum, Medicago sativa, Lens culinaris, Vigna mungo, Vicia faba, Phaseolus vulgaris, and Cicer arietinum, and based on their morphological, cultural, and biochemical characteristics, in addition to the identification of each isolate at the species level by amplified polymerase chain reaction (PCR) and using the sequencing of the nitrogenous bases of the 16S rRNA gene, it was identified as Sinrhizobium meliloti, Sinrhizobium meliloti, Bradyrhizobium elkanii, Rhizobium leguminosarium biovar viciae, Rhizobium leguminosarium biovar phaseoli and Mesorh
... Show More10 sites were selected for investigating zebra mussels in the Tigris River for the study that was conducted for the period from January to December 2020. The results of this investigation showed that zebra mussels were recorded in the Tigris at Taji on sites 7, 8, 9 and 10, while it was not found in the Tigris at Kut on sites 1, 2, 3, 4, 5 and 6. This is the first time that this species was ever recorded in the Tigris. It was found that the sites where zebra mussels appeared had a clear impact on the decrease in the total organic carbon %age and turbidity (NTU). High dissolved oxygen values were observed in the sites where zebra mussels were recorded, and the appearance of zebra mussels in these sites caused a clear decrease in
... Show MoreIn a recent study, a special type of plane overpartitions known as k-rowed plane overpartitions has been studied. The function denotes the number of plane overpartitions of n with a number of rows at most k. In this paper, we prove two identities modulo 8 and 16 for the plane overpartitions with at most two rows. We completely specify the modulo 8. Our technique is based on expanding each term of the infinite product of the generating function of the modulus 8 and 16 and in which the proofs of the key results are dominated by an intriguing relationship between the overpartitions and the sum of divisors, which reveals a considerable link among these functions modulo powers of 2.
The increase in cloud computing services and the large-scale construction of data centers led to excessive power consumption. Datacenters contain a large number of servers where the major power consumption takes place. An efficient virtual machine placement algorithm is substantial to attain energy consumption minimization and improve resource utilization through reducing the number of operating servers. In this paper, an enhanced discrete particle swarm optimization (EDPSO) is proposed. The enhancement of the discrete PSO algorithm is achieved through modifying the velocity update equation to bound the resultant particles and ensuring feasibility. Furthermore, EDPSO is assisted by two heuristic algorithms random first fit (RFF) a
... Show MoreThe use of remote sensing and Geographic Information System (GIS) are among the most efficient modern tools to study the varied natural resources in terms of localization, identification of characteristics, and the study of its dynamics. Thus, the aim of this study is to show the importance of remote sensing and Geographical Information System in studying the Guercif irrigated plain. We will first process and analyze satellite images using the program (Erdas IMAGINE 15. 00) and then create thematic maps illustrating the irrigated area's evolution (ArcGIS 10.8). The results revealed that since the late 20th century, the area of Guercif Plain has expanded significantly, with the total irrigated space that has been doubled many
... Show MoreThis study has applied digital image processing on three-dimensional C.T. images to detect and diagnose kidney diseases. Medical images of different cases of kidney diseases were compared with those of healthy cases. Four different kidneys disorders, such as stones, tumors (cancer), cysts, and renal fibrosis were considered in additional to healthy tissues. This method helps in differentiating between the healthy and diseased kidney tissues. It can detect tumors in its very early stages, before they grow large enough to be seen by the human eye. The method used for segmentation and texture analysis was the k-means with co-occurrence matrix. The k-means separates the healthy classes and the tumor classes, and the affected
... Show MorePolymorphisms in the genes of G-protein subunit beta 3 (GNB3); rs5443, tryptophan hydroxylase 1 (TPH1); rs211105 and rs4537731, tryptophan hydroxylase 2 (TPH2); rs4570625 and sodium voltage-gated channel alpha subunit 5 (SCN5A); rs1805124, have known to cause the abnormalities in the gastrointestinal tract that are implicated to irritable bowel syndrome (IBS) predisposition. Upfront genetic polymorphism genotyping in IBS-related gene polymorphisms will help to intervene and guide the decision-making in the management of IBS patients. This study aimed to develop a genotyping method to detect the respective polymorphisms using nested allele-specific multiplex polymerase chain reaction (NASM-PCR). A combi
... Show MoreThis study aims to determine the exposure of dentists to radiation resulting from the use of light therapy units and to assess their risk and impact on dental clinics. This study was conducted in private dental clinics in the city of Erbil in northern Iraq. Surveys were conducted to collect information about light-curing units. The results were analysed using the multi-response logistic regression to determine the factors affecting the radiation values of light-curing units. The results of the study showed that five major variables have a major effect by radiation. This is shown with a value of P ≤ 0.05. Typical treatment times with radiant light, with a typical number of daily restorations, may exceed the risk limits for
... Show MoreThe present research design examines the relationship between SCARB1 gene expression and the progression of chronic myeloid leukemia (CML) in Iraqi patients. The variations in gene expression between patients with CML and healthy controls were investigated. The gender and age correlations with CML patients were included, as was the association of gene expression folding of the SCARB1 gene with clinical data (WBC, RBC, hemoglobin, platelets, and BCR-ABL gene). The results displayed a significant difference in the mean gene expression level (∆Ct) of the CML group when compared to the matching ∆Ct values in the healthy control group. The gene expression folding of the SCARB1 gene indicates considerable changes in expression, wh
... Show MoreDiabetes mellitus (DM) is a chronic metabolic disease that is considered a major worldwide healthcare problem. Multiple studies have revealed that people with DM are more likely to acquire oral problems, such as periodontal diseases, because the oral microbiota plays a major role in oral health and may affect the saliva composition. This study aimed to characterize the oral microbiota of a sample of DM patients and its association with some demographic factors, such as smoking habits and gender. A total of 91 specimens, including 51 DM patients and 40 apparently healthy individuals, were enrolled in this study, which was carried out from November 2021 to February 2022. Whole saliva was collected in a sterile tube, and oral swabs
... Show MoreDespite their long successful use, synthetic dyes have several problems due to their carcinogenic and toxic effects. Besides providing bright colors, some natural pigments have shown notable antimicrobial activity; thus, they could be utilized as functional dyes in many applications such as making colored antimicrobial textiles. In this work, a yellow pigment produced by Streptomyces thinghirensis AF7 and has a notable antimicrobial activity was used to produce a colored antimicrobial textile. The extracted yellow pigment was subjected to a purification step using silica gel column eluted with di ethyl ether solvent. The FTIR, GC-MS and NMR analysis showed that the colorings in this type of product are due to t
... Show MoreCyberbullying is one of the major electronic problems, and it is not a new phenomenon. It was present in the traditional form before the emergence of social networks, and cyberbullying has many consequences, including emotional and physiological states such as depression and anxiety. Given the prevalence of this phenomenon and the importance of the topic in society and its negative impact on all age groups, especially adolescents, this work aims to build a model that detects cyberbullying in the comments on social media (Twitter) written in the Arabic language using Extreme Gradient Boosting (XGBoost) and Random Forest methods in building the models. After a series of pre-processing, we found that the accuracy of classification of t
... Show MoreCloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show MoreOur aim in this work is to investigate prime submodules and prove some properties of them. We study the relations between prime submodules of a given module and the extension of prime submodules. The relations between prime submodules of two given modules and the prime submodules in the direct product of their quotient module are studied and investigated.
Cloud computing describes computer services provided through the internet and includes a wide range of virtualization resources. Because cloud computing is made up of a sizable number of heterogeneous autonomous systems with an adaptable computational architecture, it has been widely adopted by many businesses. The scheduling and management of resource utilization, however, have become more difficult as a result of cloud computing. Task scheduling is crucial, and this procedure must schedule tasks on the virtual machine while using the least amount of time possible. Utilizing an effective scheduling strategy enhances and expedites cloud computing services. Optimization techniques are used to resolve cloud scheduling problems.
... Show MoreIn this work, the mathematical modelling of peristaltic transport for incompressible Sutterby fluid through the cavity between coaxial tubes where the inner tube is fixed and the outer tube has sinusoidal rhythmic fluctuations along the channel’s walls is presented. Under the assumption of long wavelength and the low Reynolds number, the governing equations (motion, temperature, and concentration) are illustrated in cylindrical coordinates. The analytical solution for the temperature and concentration of the fluid flow is obtained using Mathematica 11.3, whereas the perturbation technique is employed to find the closed form of the velocity profile. The variation of the axial velocity, stream function, temperat
... Show MoreIn this paper, the bi-criteria machine scheduling problems (BMSP) are solved, where the discussed problem is represented by the sum of completion and the sum of late work times simultaneously. In order to solve the suggested BMSP, some metaheurisitc methods are suggested which produce good results. The suggested local search methods are simulated annulling and bees algorithm. The results of the new metaheurisitc methods are compared with the complete enumeration method, which is considered an exact method, then compared results of the heuristics with each other to obtain the most efficient method.
The variational iteration method is used to deal with linear and nonlinear differential equations. The main characteristics of the method lie in its flexibility and ability to accurately and easily solve nonlinear equations. In this work, a general framework is presented for a variational iteration method for the analytical treatment of partial differential equations in fluid mechanics. The Caputo sense is used to describe fractional derivatives. The time-fractional Kaup-Kupershmidt (KK) equation is investigated, as it is the solution of the system of partial differential equations via the Boussinesq-Burger equation. By comparing the results that are obtained by the variational iteration method with those obtained by the two-dim
... Show MoreThe main goal of our research is to synthesize novel nano Zn2+ complex with the 8-(2-(dansyl chloride)azo) adenine (LA) ligand as a pH sensor because of its advantageous properties, obtained from a single molecule. The Zn2⁺- LA complex was based on the production of an intensely dark purple-colored substance with λmax at 552 nm. Molar ratio of Zn2⁺- LA complex is a 1:2 in aqueous buffer. The optimum concentration (0.3) mM, pH (2-5.5), and time (0-3) hr at pH=5.5, that in the studies followed Lambert-law Beer'
This paper examines the finding of spacewise dependent heat source function in pseudoparabolic equation with initial and homogeneous Dirichlet boundary conditions, as well as the final time value / integral specification as additional conditions that ensure the uniqueness solvability of the inverse problem. However, the problem remains ill-posed because tiny perturbations in input data cause huge errors in outputs. Thus, we employ Tikhonov’s regularization method to restore this instability. In order to choose the best regularization parameter, we employ L-curve method. On the other hand, the direct (forward) problem is solved by a finite difference scheme while the inverse one is reformulated as an optimization problem. The
... Show MoreComputer vision is an emerging area with a huge number of applications. Identification of the fingertip is one of the major parts of those areas. Augmented reality and virtual reality are the most recent technological advancements that use fingertip identification. The interaction between computers and humans can be performed easily by this technique. Virtual reality, robotics, smart gaming are the main application domains of these fingertip detection techniques. Gesture recognition is one of the most fascinating fields of fingertip detection. Gestures are the easiest and productive methods of communication with regard to collaboration with the computer. This analysis examines the different studies done in the field of
... Show MoreAs smartphones incorporate location data, there is a growing concern about location privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf
... Show MoreWe will provide a new method in this study that integrates two types of applications, namely Graph Theory and Conjugate Young Diagram, the idea of combining the graph and the Young diagram is presented by Ali And Mahmood, which is primarily based on the idea of the e-abacus diagram, the new method is called GCYD, it directly applies to the English letter section, which will be a two-layer coding. It makes it difficult to detect the word or sentence.
The monocyte chemo-attractant protein-1 (MCP-1) is one of the pro-inflammatory cytokines. It controls the passage and infiltration of monocytes, macrophages, natural killers, and T cells into the sites of inflammation. The aim of this study is to inspect the role of MCP-1 in maternal metabolic, physiological changes and pregnancy complications like gestational diabetes mellitus, dyslipidemia, and hypertension to develop pharmaceutical strategies for these complications. This study included ninety Iraqi women divided into three groups: thirty pregnant women in their first trimester as the P1 group; thirty pregnant women in their third trimester as the P2 group; and thirty healthy non-pregnant women as the control or C group. Se
... Show MoreThe existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show More