في هذا العمل تم دراسة المقاسات الاولية من النمطEn المرصوصة المكتضة ودراسة تعيم هذا المفهوم الى مفهوم الآثار الاولية من النمط En المرصوصة المكتضة حيث تم دراسة بعض العلاقات والتشخيصات الخاصة بهذه المفاهيم حيت تم برهنت العلاقات الخاصة بمفهوم المقاسات الاولية من النمط En المرصوصة المكتضة ليكن ₩ مقاس و كل مقاس جزئي هو اولي من النمط En فان المقاس ₩ هو مقاس اولي من النمط En مرصوص مكتض اذا و فقظ اذا كل مقاس جزئي دائري و كذلك تمت برهنت اذا كان المقاس ₩ اولي من النمظ En مرصوص مكتض يمتلك على الاقل مقاس جزئي اعظم فان ₩ يحقق خاصية ACC على المقاس الجزئي الاولي من النمط En-p-radical. قد تم دراسة مفهوم الاثار الاولية من النمط En المرصوصة المكتضة والتي هي تعميم لمفهوم المقاسات الاولية من النمط En المرصوصة المكتضة حيث تم برهنت بعض الخواص وبعض التشخيصات الخاصة بمفهوم الاثار الاولية من النمط En المرصوصة المكتضة , اذا كان الاثر Д اولي من النمط En مرصوص مكتض ويمتلك على الاقل اثر جزئي اعظم فان الاثر Д يحقق خاصية ACC على الاثر من النمط En-p-radical
The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed
The concept of tolerance is gaining its importance in the midst of an international society suffering from violence, wars and internal and international crises. It is practiced by extremist and extremist forces and movements acting in the name of religion to exclude the different Muslim and non-Muslim people according to the unethical practices and methodologies of Islamic law and reality. , Cultural, civilization .. that distinguish our world today. The society today is suffering from the ideas of the intellectual and aesthetic views of the different ideologically, ethnically, culturally and religiously in the world of the South. This is what the end-of-history thesis of Fukuyama and the clash of civilizations represented to Huntington.
... Show MoreIn this paper, we define some generalizations of topological group namely -topological group, -topological group and -topological group with illustrative examples. Also, we define grill topological group with respect to a grill. Later, we deliberate the quotient on generalizations of topological group in particular -topological group. Moreover, we model a robotic system which relays on the quotient of -topological group.
Relation on a set is a simple mathematical model to which many real-life data can be connected. A binary relation on a set can always be represented by a digraph. Topology on a set can be generated by binary relations on the set . In this direction, the study will consider different classical categories of topological spaces whose topology is defined by the binary relations adjacency and reachability on the vertex set of a directed graph. This paper analyses some properties of these topologies and studies the properties of closure and interior of the vertex set of subgraphs of a digraph. Further, some applications of topology generated by digraphs in the study of biological systems are cited.
Abstract:
the system of Administrative Control in organizations meets the need to check on the optimal use and proper resources and conservation to achieve the objectives sought by the organization, hence the system of Administrative Control is part of the overall system in any organization that has undergone evolution always to be able to keep up with progress in the development of other sciences, and that the growth of coherence between subordinates in the organization means the ability to influence the opinions, ideas and attitudes to change it for directions the organization and its values and this is reflected positively on the coherence of the organization, the researcher interest of the imp
This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show More