The Old World Screwworm Fly Chrysomya bezziana is a new insect pest on cattles and other domestic recor¬ded for the first from Iraq. It was first observed in cow's vagina in September of 1996 in Shaikh Hammed (Tarmiya), near Baghdad city. Chrysomya bezziana Villeneuve is well known as one of the most important insect pests of livestock. Its larvae infest living tissues by causing myiasis. In a wide range of worm-blooded host species (Spradbery and Vanningham, 1980; Spradbery and Kirk. 1992). It is widely dist¬ributed species over an extensive area of tropical and subtropical Africa, the Arabian Gulf countries, Iran. Indian subcontinent. South-East Asia. Indonesia, and as far east as Papua New Guinea (Zurapt, 1965; Djalayer et al. 1978; loft et al. 1981; Spradbery et al. 1992 and 1995).
The aim of this research is to study some types of fibrewise fuzzy topological spaces. The six major goals are explored in this thesis. The very first goal, introduce and study the notions types of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where j={δ,θ,α,p,s,b,β} The second goal is to introduce weak and strong forms of fibrewise fuzzy ω-topological spaces, namely the fibrewise fuz
... Show MoreThe purpose of this paper is to introduce a new type of compact spaces, namely semi-p-compact spaces which are stronger than compact spaces; we give properties and characterizations of semi-p-compact spaces.
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show Morein this paper the notion of threshold relations by using resemblance relation are introduced to get a similarity relation from a resemnblance relation R
In this paper, certain types of regularity of topological spaces have been highlighted, which fall within the study of generalizations of separation axioms. One of the important axioms of separation is what is called regularity, and the spaces that have this property are not few, and the most important of these spaces are Euclidean spaces. Therefore, limiting this important concept to topology is within a narrow framework, which necessitates the use of generalized open sets to obtain more good characteristics and preserve the properties achieved in general topology. Perhaps the reader will realize through the research that our generalization preserved most of the characteristics, the most important of which is the hereditary property. Two t
... Show MoreLet R be a commutative ring with identity, and W be a unital (left) R-module. In this paper we introduce and study the concept of a quasi-small prime modules as generalization of small prime modules.
The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t
... Show More