The aim of this paper is to generate topological structure on the power set of vertices of digraphs using new definition which is Gm-closure operator on out-linked of digraphs. Properties of this topological structure are studied and several examples are given. Also we give some new generalizations of some definitions in digraphs to the some known definitions in topology which are Ropen subgraph, α-open subgraph, pre-open subgraph, and β-open subgraph. Furthermore, we define and study the accuracy of these new generalizations on subgraps and paths.
The effect of using three different interpolation methods (nearest neighbour, linear and non-linear) on a 3D sinogram to restore the missing data due to using angular difference greater than 1° (considered as optimum 3D sinogram) is presented. Two reconstruction methods are adopted in this study, the back-projection method and Fourier slice theorem method, from the results the second reconstruction proven to be a promising reconstruction with the linear interpolation method when the angular difference is less than 20°.
Today technology using nanoparticle when treatment pathogentic microorganism and we focused on this here. It was found that the species of streptococcus used in present study were sensitive to erythromycin. In present study focusing biofilm formation by Streptococcus spp was evaluated. Species S. mutans was found that highest amount of biofilm compare with the other species. The aim of report effect (SNPs) on ability of biofilm form different species of streptococcus. The anti-biofilm effect of SNPs was in concentration dependent manner. The highest effect of SNP against biofilm formation was found the concentration 160 μg/ml, while the lowest effect was found the lowest used concentration (80 μg/ml) of SNPs. In vivo study revealed that s
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreTo achieve sustainability in the field of civil engineering, there has become a great interest in developing reactive powder concrete RPC through the use of environmentally friendly materials to reduce the release of CO2 gas produced from cement factories as well as contribute to the recycling of industrial wastes that have a great impact on environmental pollution.
In this study, reactive powder concrete was prepared using total binder content of 800 kg/m3, water to binder ratio (0.275), and micro steel fibers 1% by volume of concrete. The experimental program included replacing fly ash with (8, 12, 16) % by cement weight to find the optimal ratio, which achieved the best mechanical proper
... Show MoreBackground: Smoking is the major environmental risk factor that has been associated with the pathogenesis and progression of periodontal diseases. Interleukin-8 (IL-8), has been associated with the immunopathology of periodontitis. Objectives: To determine the influence of smoking on salivary Interleukin-8 level from smokers and non-smokers with periodontitis and periodontally healthy control subjects.
Materials and Methods: Un-stimulated saliva samples were collected of 90 participants: 30 smokers and 30 non-smokers with chronic periodontitis, as well as 30 periodontally healthy control subjects. The clinical parameters such as the pocket depth, clinical attachment loss, plaque index, and gingiv
... Show MoreAn intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show MoreThe research investigates the political effect and its directions on the architectural thoughts and its achievements and how can this political system affect all fields of life in communities including architectural urban design. The problem of the research lies in the ambiguity effects of the ideological national directions of the Nazi Party on the architecture and urban design of the city of Berlin, then determining the aims of the research to discuss the concepts of politics and architecture and their relation to the way of thinking that plays a role in the process of design that works on property and achieving the suitable urban environments for those communities. After that, the Nazi's party's thought would be studied and analyzed,
... Show More