The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
KS Ismaeil, BR Jawad, Journal of Physical Education, 2023
The objective of the study is to demonstrate the predictive ability is better between the logistic regression model and Linear Discriminant function using the original data first and then the Home vehicles to reduce the dimensions of the variables for data and socio-economic survey of the family to the province of Baghdad in 2012 and included a sample of 615 observation with 13 variable, 12 of them is an explanatory variable and the depended variable is number of workers and the unemployed.
Was conducted to compare the two methods above and it became clear by comparing the logistic regression model best of a Linear Discriminant function written
... Show MoreThe impact of undergraduate research experiences on students' academic development and retention in STEM fields is significant. Students' success in STEM fields is based on developing strong research and critical thinking skills that make it essential for students to engage in research activities throughout their academic programs. This work evaluates the effectiveness of undergraduate research experiences with respect to its influence on student retention and academic development. The cases presented are based on years of experience implementing undergraduate research programs in various STEM fields at Colorado State University Pueblo (CSU Pueblo) funded by HSI STEM Grants. The study seeks to establish a correlation between students' reten
... Show MoreIn this work, a composite material was prepared from Low-density polyethylene (LDPE) with different weight percent of grain and calcinations kaolin at temperature of (850oC) using single screw extruder and a mixing machine operated at a temperature between (190-200oC). Some of mechanical and physical properties such as tensile strength, tensile strength at break, Young modulus, and elongation at break, shore hardness and water absorption were determined at different weight fraction of filler (0, 2, 7, 10 and 15%). It was found that the addition of filler increases the modulus of elasticity, elongation at break, shore hardness and impact strength; on other hand, it decreases the tensile strength and tensile strength
... Show MoreKHalaf Alhmar and what we get from his poem
The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
A new generalizations of coretractable modules are introduced where a module is called t-essentially (weakly t-essentially) coretractable if for all proper submodule of , there exists f End( ), f( )=0 and Imf tes (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreBackground: Fetal macrosomia is usually distressing to obstetricians and neonatologists. In the current study, involved mothers had poor social and medical circumstances, as they were migrated forcefully within the country borders due to war, from their original homeland to safer camps which had miserable situations. Objectives: To study rate, risk factors, and complications of macrosomia in people with low socio-economic living conditions and missed medical follow up. Methods: All internally displaced pregnant women who gave birth to neonates weighed ≥4000 g were involved in the study. All required history, examination, care, and investigations were practiced by the attending obstetrician and neonatologist. Cases of normal birth weight n
... Show More