This paper is devoted to introduce weak and strong forms of fibrewise fuzzy ω-topological spaces, namely the fibrewise fuzzy -ω-topological spaces, weakly fibrewise fuzzy -ω-topological spaces and strongly fibrewise fuzzy -ω- topological spaces. Also, Several characterizations and properties of this class are also given as well. Finally, we focused on studying the relationship between weakly fibrewise fuzzy -ω-topological spaces and strongly fibrewise fuzzy -ω-topological spaces.
However, the effects of these ideas are still evident
Think of those who follow the footsteps of Muslim scholars and thinkers.
Intellectual source of Gnostic Gnar
And in dealing with issues of Islamic thought
Annalisa intersecting trends of thought, Minya who melts in Masarya and supported him and believes in Bo and extremist Vue,
Lea, trying to throw it with a few times, looks at Elya look
There are those who stand in the opposite position
There are those who stand in a selective compromise, but this school of thought remains
G - the features of Islamic thought that believes in the mind and Imoto in the defense of
An intellectual station and generalized bar
Creed. In his study, the researcher wi
The research studies the melodic and rhythmic characteristics of monologue, in addition to how it was transferred from the Arab homeland to Iraq and reviewed its most prominent performers, as well as a review of the monologue types and their propagation in the Arab homeland such as comical, dramatic, and political and guidance monologues.
The methodological framework included: the problem of the research, the importance of the research and the objective of the research which is to uncover the melodic and rhythmic structure of the monologue in Iraq. The limits of the research included the objective limit tackling the art of monologue and the spatial limit which is Baghdad
... Show Morethe structrual and mechanical properties of thin Ni films of different thicknesses deposited on coring glass substrate using lonbeam sputtering(IBS) technique under vacuum torr have been studied the TEM and electron
The city of Derna has distinctive architectural and architectural features, like other Arab and Islamic cities in the Arab West and North Africa. Its markets and shops have taken many different forms and structural forms within the urban fabric of the central commercial zone. The meeting between the various commercial and handicraft jobs and consumers within a spatial area starting with the old markets of the dark market and the agency of the harvest and vegetable market and the mosque of the old and the square of the mosque and the Red Square and the square Kharazin. It then grew linearly towards commercial hubs that were associated with the city's expansion axes. Old markets represent the architectural and planning heritage associated
... Show MoreIn this paper a new series of morpholine derivatives was prepared by reacting the morpholine with ethyl chloro acetate in the presence triethylamine as a catalyst in benzene gave morpholin-N-ethyl acetate(1) which reacted with hydrazine hydrate in ethanol, and gave morpholin-N-ethyl acetohydrazide (2) . Morpholin-N-aceto semithiocarbazide (3) were prepared by reacting compound(2) with ammonium thiocyanate , concentrated hydrochloric acid and ethanol as a solvent .Compound (3) reacted with sodium hydroxide and hydrochloric acid to give 5-(morpholin-N-methylene)-1H-1,2,4-triazole-3-thiol (4) .The new series of 1,2,4-triazol derivatives (5-8) was synthesized by reaction of compound(4) with formaldehyde , DMF as a solvent and different
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreA number of juices, jams, canned foods and frozen fishes available in local markets were inspected with respect to microbial contamination. We have determined the total viable bacterial cell counts in these samples and the number of g(-) lactose fermentors as a bacterial indicator of food spoilage. The results indicated that most of the food items inspected, were contaminated with large numbers of different species of g(-) ,g(+), yeast and fungi and some were contained more than the maximum permissible number of pathogenic g(-) enteric E-coli, which render these food items unsafe for human consumption.
The experiment was conducted in field of the University of Baghdad, Jadryia region, Baghdad to measure vibration and performance efficiency of grass mower (machine cutting grass). Vibration in three axes are longitudinal X , lateral Y and vertical Z in four places of mower machine during cutting grass and Practical Productivity, Efficiency and Fuel Consumption measured in this experiment . Factorial design (3 x 2) used, mower speeds included 1.9 3.6 and 6.4 km/hr and engine load included idling and full load according to randomized complete design were used in this experiment. Least Significant Design (LSD) 0.05 was used to compare the mean of treatment. Result were showed that the mower speed 6.4 km/hr recorded high productivity (0.6557 ha
... Show MoreWith the narratives and sayings in the biography of the Prophet and the science of the Koran, Orientalists used this case as a pretext to distort the biography of the Prophet and his character and patience for his call. Researcher in the folds of his research.