In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.
The inflammatory response is a crucial aspect of the tissues’ responses to deleterious inflammogens. This complex response involves leukocytes cells such as macrophages, neutrophils, and lymphocytes, also known as inflammatory cells. In response to the inflammatory process, these cells release specialized substances which include vasoactive amines and peptides, eicosanoids, proinflammatory cytokines, and acute-phase proteins, which mediate the inflammatory process by preventing further tissue damage and ultimately resulting in healing and restoration of tissue function. This review discusses the role of the inflammatory cells as well as their by-products in the mediation of inflammatory process. A brief insight into the role of natural an
... Show MoreThis research is devoted to investigating the thermal buckling analysis behaviour of laminated composite plates subjected to uniform and non-uniform temperature fields by applying an analytical model based on a refined plate theory (RPT) with five unknown independent variables. The theory accounts for the parabolic distribution of the transverse shear strains through the plate thickness and satisfies the zero-traction boundary condition on the surface without using shear correction factors; hence a shear correction factor is not required. The governing differential equations and associated boundary conditions are derived by using the virtual work principle and solved via Navier-type analytical procedure to obtain critica
... Show MoreThe electronic characteristics, including the density of state and bond length, in addition to the spectroscopic properties such as IR spectrum and Raman scattering, as a function of the frequency of Sn10O16, C24O6, and hybrid junction (Sn10O16/C24O6) were studied. The methodology uses DFT for all electron levels with the hybrid function B3-LYP (Becke level, 3-parameters, Lee–Yang-Parr), with 6-311G (p,d) basis set, and Stuttgart/Dresden (SDD) basis set, using Gaussian 09 theoretical calculations. The geometrical structures were calculated by Gaussian view 05 as a supplementary program. The band gap was calculated and compared to the measured valu
... Show MoreIn this study, the thermal buckling behavior of composite laminate plates cross-ply and angle-ply all edged simply supported subjected to a uniform temperature field is investigated, using a simple trigonometric shear deformation theory. Four unknown variables are involved in the theory, and satisfied the zero traction boundary condition on the surface without using shear correction factors, Hamilton's principle is used to derive equations of motion depending on a Simple Four Variable Plate Theory for cross-ply and angle-ply, and then solved through Navier's double trigonometric sequence, to obtain critical buckling temperature for laminated composite plates. Effect of changing some design parameters such as, ortho
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreAcid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreConstruction projects are characterized as projects with multi phases and activities, complex, unique, and have many different parties and stakeholders. Risks could appear at one or more of the construction project stages and may affect the achievement of project objectives. Therefore, one of the key elements in the planning phase of any project is the risk management process (RMP). This study attempts to understand the terminology of risk in general, risk management, and response to risk in particular. This study is mainly a review of thirty-eight studies that have been published between 1997 and 2020 that demonstrate the importance of the crucial phase of risk response from the risk management process and its impact on
... Show Moreحضيت القيادة باهتمام كبير من قبل الباحثين ودورها الإيجابي في التأثير على الموظفين ونجاح المنظمات، في الآونة الأخير بدأت الدراسات تركز على الجانب المظلم للقيادة وتأثيرها على التابعين وبيئة العمل، وقد تم تحديد القيادة السامة بأنها أخطر الأساليب القيادية التي تتسبب بتكاليف مادية ومعنوية على المنظمات بمختلف جوانبها، ان القيادة السامة تأثر على دوافع المرؤوسين وقدرتهم على انجاز المهام، ورغبتهم في الاستمرار في
... Show More