Preferred Language
Articles
/
9Ra044cBVTCNdQwCUmpR
INTERSECTİONAL (α,A )-SOFT NEW-İDEALS İN PU-ALGEBRAS
...Show More Authors

Publication Date
Sun Dec 01 2019
Journal Name
Gazi University Journal Of Science
Lower Separation Axioms in C ̌ech Fuzzy Soft Closure Spaces
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Seismic Analysis of Floating Stone Columns in Soft Clayey Soil
...Show More Authors

The response of floating stone columns of different lengths to diameter ratio (L/D = 0, 2, 4, 6, 8, and 10) ratios exposed to earthquake excitations is well modeled in this paper. Such stone column behavior is essential in the case of lateral displacement under an earthquake through the soft clay soil. ABAQUS software was used to simulate the behavior of stone columns in soft clayey soil using an axisymmetric finite element model. The behavior of stone column material has been modeled with a Drucker-Prager model. The soft soil material was modeled by the Mohr-Coulomb failure criterion assuming an elastic-perfectly plastic behavior. The floating stone columns were subjected to the El Centro earthquake, which had a magnitude of 7.1 an

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Mon Apr 11 2016
Journal Name
Annals Of Fuzzy Mathematics And Informatics
Some notions on convex soft sets
...Show More Authors

View Publication
Publication Date
Sun Nov 17 2019
Journal Name
Journal Of Interdisciplinary Mathematics
Soft 𝒦(<i>sc</i>)-spaces
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Cech Fuzzy Soft Bi-Closure Spaces
...Show More Authors
Abstract<p>In the present study, Čech fuzzy soft bi-closure spaces (Čfs bi-csp’s) are defined. The basic properties of Čfs bi-csp’s are studied such as we show from each Čfs bi-csp’s (<italic>u, L<sub>1</sub>, L<sub>2</sub>, S</italic>) we can obtain two types of associative fuzzy soft topological spaces, the first is a fuzzy soft bitopological space (<italic>U, τ<sub>L<sub>1</sub> </sub>, τ<sub>L<sub>2</sub> </sub>, S</italic>) and the second is a fuzzy soft topological space (<italic>U, τ<sub>L<sub>1</sub> </sub> </italic></p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Jordanian Journal Of Computers And Information Technology
ARABIC SOFT SPELLING CORRECTION WITH T5
...Show More Authors

Spelling correction is considered a challenging task for resource-scarce languages. The Arabic language is one of these resource-scarce languages, which suffers from the absence of a large spelling correction dataset, thus datasets injected with artificial errors are used to overcome this problem. In this paper, we trained the Text-to-Text Transfer Transformer (T5) model using artificial errors to correct Arabic soft spelling mistakes. Our T5 model can correct 97.8% of the artificial errors that were injected into the test set. Additionally, our T5 model achieves a character error rate (CER) of 0.77% on a set that contains real soft spelling mistakes. We achieved these results using a 4-layer T5 model trained with a 90% error inject

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sun Feb 08 2026
Journal Name
Journal Of Baghdad College Of Dentistry
The Soft Tissue Changes Following Orthodontic Treatment of Bimaxillary Protrusion (A Clinical and Photographical Study)
...Show More Authors

Background: Bimaxillary protrusion is considered as one of the most important causes to seek the orthodontic treatment to get better esthetics. This study aimed to test the effect of orthodontic treatment in improvement the facial esthetics. Materials and Methods: Ten Iraqi Arab females having bimaxillary protrusion based on Class I malocclusions treated with fixed orthodontic appliance and extraction of the maxillary and mandibular 1st permanent premolars. Pre and post-treatment facial profile photographs were taken for each patients and the effect of treatment was tested in comparison with the pre-treatment photographs by using seven angular measurements. Results: After treatment, the upper and lower lip projections were decreased signifi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 08 2026
Journal Name
Magazine Aldhakwat Albedh
Ideals and values in the texts of the second century AH - Visit forty examples - Technical objective study
...Show More Authors

Values and ideals are two basic pillars in human life, and high societies have been keen throughout their ages to adhere to and establish them so that man can distinguish good and evil, right and wrong, as they are a balance of actions that give man a higher value. Many of the followers of Abbasid literature, poetry and prose – it is noted that many imams and writers have been keen to highlight these values and make them material for their poetry and literature, courage, generosity, chastity and....All meanings of human values and there is no doubt that one of the texts abounding in this field is what was reported from the people of the house of infallibility pure (peace be upon them), including we touch it in the visit of Imam Jaafar al-

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Meaning of Added Verbs A New Approach: Meaning of Added Verbs A New Approach
...Show More Authors

Summary
The subject ( meaning of added verbs) is one of the main subjects
which study in morphology since in Arabic language. It is include the meaning
of each format, and the increased meaning occurred by this increment in the
verbs.
The (strain) is one of very important meaning in this subject, it takes a
wide area of morphology studies, and interesting of scientists and
researchists.
There are two famous formats for this meaning; (infa la انفع
ل ), and (ifta
la افتع
ل ). Also There are another formats for the same meaning, but less than
the first two in use, they are; (taf ala تفعّ
ل ), (tafa ala تفاع
ل ), (taf lala ) ,(تفعل
ل
ifanlala افعنلل ), (ifanla .(

... Show More
View Publication Preview PDF