In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.
This study aims to explore the relationship between the degree of application of digital leadership and the development of administrative work at the University of Tabuk. It further aims to examine the presence of statistically significant differences between the average responses of faculty members and employees at the University of Tabuk regarding the study axes that are attributed to the following variables: (scientific rank, gender, and job), the study used the descriptive approach in its correlative style, and the questionnaire was used as a tool for data collection, as it was applied to a simple random of (310) members of the faculty and staff. University of Tabuk. The results showed that the degree of digital leadership applicatio
... Show MoreThis mini review provides an overview of methods for manufacturing expanded graphite (EGT) and the use of its composites with metal oxides in the field of photodegradation of dyes. Dyes from textile manufacturing represent a significant environmental pollution problem in waterways worldwide, highlighting the need for environmentally friendly and efficient technologies to remove dyes from industrial and local wastewater. Photodegradation technologies offer a low-cost, sustainable solution with minimal secondary pollution. Carbon-based materials, such as expanded graphite, are advantageous in enhancing catalytic activity. Accordingly, this review will explore the different fabrication techniques of expanded graphite and summarize the recent d
... Show MoreThe water supply network inside the building is of high importance due to direct contact with the user that must be optimally designed to meet the water needs of users. This work aims to review previous research and scientific theories that deal with the design of water networks inside buildings, from calculating the amount of consumption and the optimal distribution of the network, as well as ways to rationalize the use of water by the consumer. The process of pumping domestic water starts from water treatment plants to be fed to the public distribution networks, then reaching a distribution network inside the building till it is provided to the user. The design of the water supply network inside the building is
... Show MoreAbstract:
This research aims to compare Bayesian Method and Full Maximum Likelihood to estimate hierarchical Poisson regression model.
The comparison was done by simulation using different sample sizes (n = 30, 60, 120) and different Frequencies (r = 1000, 5000) for the experiments as was the adoption of the Mean Square Error to compare the preference estimation methods and then choose the best way to appreciate model and concluded that hierarchical Poisson regression model that has been appreciated Full Maximum Likelihood Full Maximum Likelihood with sample size (n = 30) is the best to represent the maternal mortality data after it has been reliance value param
... Show MoreWalter Lippmann, speaking about man, says : ” Gradually he makes for himself a trustworthy picture inside his head of the world beyond his reach. “. This means that the picture, whether it was good or bad, it doesn’t happen for nothing, but rather for intentional purposes. Some orientalists make their judgements even before getting to the place concerned with the study.
The mental image is one of the most misused terminology, although the world today has become the world of image, it witnessed the disappearance of the theories that used to consider the media as a reflective mirror for society, also it was confirmed that the media creates what varies from reality and sometimes completely different from reality. The image of
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreBackground: A wound is defined as a break or damage in the skin, resulting from physical or thermal damage or as a result of the presence of an underlying medical or physical condition. Herbal medicine can be called one of the branches of medicine in various forms.Phyllunthus amarus is a small herb well known for its medicinal properties and widely used worldwide. P. amarus is an important plant of Indian Ayurvedic system of medicine. Fibronectin is a major component of the extracellular matrix. It is secreted by various cells, primarily fibroblasts, as a soluble protein dimer and is then assembled into an insoluble matrix in a complex cell-mediated process. Materials and methods: Forty rats will be subjected for a surgical operation
... Show MoreIn probability theory generalizing distribution is an important area. Several distributions are inappropriate for data modeling, either symmetrical, semi-symmetrical, or heavily skewed. In this paper, a new compound distribution with four parameters called Marshall Olkin Marshall Olkin Weibull (MOMOWe) is introduced. Several important statistical properties of new distribution were studied and examined. The estimation of unknown four parameters was carried out according to the maximum likelihood estimation method. The flexibility of MOMOWe distribution is demonstrated by the adoption of two real datasets (semi-symmetric and right-skewed) with different information fitting criteria. Su
In the rapidly evolving telecommunications industry, accurate valuation of tangible assets remains a critical challenge that requires adherence to universally recognized standards. This study addresses the pressing need for transparent and precise asset valuation methodologies that are pivotal for informed investment decisions and financial reporting. It aims to bridge the theoretical and practical divide in asset valuation by applying International Valuation Standards (IVS) 300 and 400 to Asiacell Communications PJSC, a leading entity in the sector. Focusing on five key tangible assets from 2018 to 2022 – lands, buildings, plant and equipment, means of transport and transfer, and furniture and office equipment – the study emplo
... Show MoreLithium–Manganese ferrites having the chemical formula (Li0.5-0.5x Mnx Fe2.5-0.5x O4), (0 ≤ x ≤ 1) were prepared by double sintering powder processing. The density of the ferrite increased with Mn content while the porosity was noticed to decrease. The dielectric constant was found to increase at high frequencies more rapidly than the low ones. The dielectric constant found to decrease with Mn content. The decrease in loss factor with frequency agreed with Deby’s type relaxation process. A maximum of dielectric loss factor was observed when the hopping frequency is equal to the external electric field frequency. Manganese substitution reduced the dielectric loss in ferrite. The variation of tanδ with frequency shows a similar na
... Show More