The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
ABSTRACT
The effect of adding raw bacteriocin produced by Lactobacillus bulgaricus to cheese curd at an amount of (5 and 10 and 15) mL/kg cheese as a biological preservative to prolong the shelf life of soft cheese, in addition to the control treatment, knowing that each 1 mL of bacteriocin filter contains 15 units/ mL of bacteriocin. The results of the physicochemical, microbial and sensory tests for cheese stored at refrigerator temperature for a period (zero) to (21) d of adding bacteriocin showed the superiority of the treatment of cheese added to 15 mL/kg cheese of bacteriocin over the rest of the other treatments during the storage period, wh
... Show MoreThe effect of UV-light on the tensile properties of pure PC has been studied. It was shown that irradiation of PC undergo a drop in the tensile properties of 30 hour of exposure. The results of irradiated samples shows that the addition of ZnO and TiO2 with different percentages (0.5, 1, 1.5 %) will reduce the Young modulus and ultimate stress of PC/ZnO ,PC/ TiO2 composites
The map of permeability distribution in the reservoirs is considered one of the most essential steps of the geologic model building due to its governing the fluid flow through the reservoir which makes it the most influential parameter on the history matching than other parameters. For that, it is the most petrophysical properties that are tuned during the history matching. Unfortunately, the prediction of the relationship between static petrophysics (porosity) and dynamic petrophysics (permeability) from conventional wells logs has a sophisticated problem to solve by conventional statistical methods for heterogeneous formations. For that, this paper examines the ability and performance of the artificial intelligence method in perme
... Show MoreIn recent years, various methods have been developed to enhance the characteristics of asphalt pavement in order to face the continuous challenges of increasing traffic loads and changing climate conditions. One of the most popular and successful methods is modifying the asphalt mixtures or asphalt binder with the addition of polymers. Therefore, two types of Polyethylene (PE) polymer, High-Density PE (HDPE) and Low-Density PE (LDPE), are used in this research. Two methods were applied to prepare PE-modified asphalt mixtures: Semi-Wet Method (S-WM) and Dry Method (DM). The findings of the investigation indicated that the addition of PE polymer can reduce the wear loss of aggregate. In general, the experimental results revealed that asphalt
... Show MoreThe cement slurry is a mixture of cement, water and additives which is established at the surface for injecting inside hole. The compressive strength is considered the most important properties of slurry for testing the slurry reliability and is the ability of slurry to resist deformation and formation fluids. Compressive strength is governed by the sort of raw materials that include additives, cement structure, and exposure circumstances. In this work, we use micro silica like pozzolanic materials. Silica fume is very fine noncrystalline substantial. Silica fume can be utilized like material for supplemental cementations for increasing the compressive strength and durability of cement. Silica fume has very fine particles size less
... Show MoreAn edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show MoreNitrogen dioxide NO2 is one of the most dangerous contaminant in the air, its toxic gas that cause disturbing respiratory effects, most of it emitted from industrial sources especially from the stack of power plants and oil refineries. In this study Gaussian equations modelled by Matlab program to state the effect of pollutant NO2 gas on area around Durra refinery, this program also evaluate some elements such as wind and stability and its effect on stacks height. Data used in this study is the amount of fuel oil and fuel gas burn inside refinery at a year 2017. Hourly April month data chosen as a case study because it’s unsteady month. After evaluate emission rate of the all fuel and calculate exit velocity from
... Show MoreThere many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.