The aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
تهدف هذه الد ا رسة الى التعرف على السلوك التصويتي للمقترعات الع ا رقيات. والأسباب التي تدفعهن للمشاركة في عملية الاقت ا رع، والعوامل المؤثرة في خيا ا رتهن التصويتية والأسباب التي تجعلها تفضل اختيار الرجل أو اختيار ام أ ر ة ، وأخي ا رً مدى م ا رعاة اج ا رءات الاقت ا رع لظروف النساء واحتياجاتهن واهتماماتهن. اعتم دتالد ا رسة منهجاً وصفياً واستعان ت بطريقة المسح بالعينةاما الاداة الرئيسية فهي الاستمارة الاستبيانية.
... Show MoreObjectives : This study was seeks to determine the IgG and IgM in serum mothers and their babies of Iraqi patient suffering from congenital anomalies toward some microorganisms such as Cytomegalovirus (CMV), Congenital toxoplasmosis , Congenital rubella and Genital herpes simplex virus (HSV) correlated with age and babies gender the sample was collected from AL- Alwayia hospital for children / Baghdad . Methodology : Fifth blood sample have been collected from mothers and their babies suffering from congenital anomalies to detection IgG and IgM of some viruses including as Cytomegalovirus (CMV), congenital tox
The topic area of that’s research dealing with values which adopted by Iraqi people since 1980, many changes and variables which make many situations and skills which the life is suitable in war and conflicts times. That’s values like traditional and ordering, traditionalism mean the conservation about values s and tradition which society adopted its. The Iraqi society suffering from many changes since 1980-2003, the consequently of that’s changes make Iraqi citizen more interested about luxury needs like clothes, while decreasing the interested about liberty of thought, beauty, show evidence of identity, and openness of mind. The processing of values changes associated with political behavior of Iraqi people which lead to weaken o
... Show MoreMedia studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i
One of the most important problems in tablet process is to control the flow of the catalyst through the hopper; Controlling the flow can be done either by changing the size of particles or added the different lubricant (stearic acid, starch, graphite) or blending of different lubricants. The study showed that we can control (increase or decrease) on the flow of the catalyst through the hopper by blending different lubricants for the constant percentage. The flow increasing when particles size (0.6 mm) and then decrease with or without lubricants, no effect on flow when particles size lower than (0.2 mm) with use that lubricants, and good flow on (0.4 mm) when use stearic acid and starch.
The dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on leather
... Show MoreThe dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More