A space X is named a πp – normal if for each closed set F and each π – closed set F’ in X with F ∩ F’ = ∅, there are p – open sets U and V of X with U ∩ V = ∅ whereas F ⊆ U and F’ ⊆ V. Our work studies and discusses a new kind of normality in generalized topological spaces. We define ϑπp – normal, ϑ–mildly normal, & ϑ–almost normal, ϑp– normal, & ϑ–mildly p–normal, & ϑ–almost p-normal and ϑπ-normal space, and we discuss some of their properties.
Suicidal ideation is one of the most severe mental health issues faced by people all over the world. There are various risk factors involved that can lead to suicide. The most common & critical risk factors among them are depression, anxiety, social isolation and hopelessness. Early detection of these risk factors can help in preventing or reducing the number of suicides. Online social networking platforms like Twitter, Redditt and Facebook are becoming a new way for the people to express themselves freely without worrying about social stigma. This paper presents a methodology and experimentation using social media as a tool to analyse the suicidal ideation in a better way, thus helping in preventing the chances of being the victim o
... Show MoreBackground: Smoking is the major environmental risk factor that has been associated with the pathogenesis and progression of periodontal diseases. Interleukin-8 (IL-8), has been associated with the immunopathology of periodontitis. Objectives: To determine the influence of smoking on salivary Interleukin-8 level from smokers and non-smokers with periodontitis and periodontally healthy control subjects.
Materials and Methods: Un-stimulated saliva samples were collected of 90 participants: 30 smokers and 30 non-smokers with chronic periodontitis, as well as 30 periodontally healthy control subjects. The clinical parameters such as the pocket depth, clinical attachment loss, plaque index, and gingiv
... Show MoreIn this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons
... Show MoreThis research of using Feldspar in the production self compacting concrete (SCC) ( 5,10,15 )% as partial replacement by weight of cement .In this research some of fresh properties of SCC ( slump flow used V-funnel test and filling ability used ( U- box test ) for concrete mixes and also some of the harden properties of SCC ( compressive and flexural tests ). The research results showed that negative effect of Feldspar on the fresh properties of self compacting concrete but the positive effect of Feldspar on the harden properties of self compacting concrete .
P. aeruginosa is a famous bacterium that causes several diseases and has a high ability to be a multidrug resistant organism that is linked with the formation of biofilm. This study aimed to investigate tssC1 gene role in the resistance of different antibiotics in the presence of biofilm. We constructed biofilm for the isolates under the study and showed the effect of different antibiotics on biofilm formation and maturation. The presence of the gene was detected through achieving PCR reaction. Finally, tssC1 gene variation was determined through sequencing and aligning the sequencing products. The results showed that most of the isolates (80%) formed biofilm that played a role in the resistance of different antibiotics which could
... Show MoreGypsum is one of the important construction materials in Iraq in plastering surfaces and gypsum board , the ability of gypsum to give a comfortable an aesthetic ambiance as a construction material increase the need of gypsum , The particle size , total surface area and particle size distribution were factors affecting plaster properties used for construction properties . In this study gypsum paste was used with different mixing ratios of particle size and studied the physical properties of these types of pastes named (standard consistency ,setting time ,density) and compressive strength . The results showed that the water to gypsum ratio increased with increasing the fineness of the gypsum to (0.75%) and the setting time to the maxi
... Show MoreAn oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More