τ*-OPEN SETS AND RELATION BETWEEN SOME WEAK AND STRONG FORMS OF Τ*-OPEN SETS IN TOPOLOGICAL SPACES
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 1
Abstract
The main goal of this paper is to study some new classes of sets by using the open sets and functions in topological spaces. For this aim, the notions of τ*-open, τ-τ*-α-open, τ-τ*-preopen, τ-τ*-semiopen, τ-τ*-b-open, τ-τ*-β-open, τ*-τ-α-open, τ*-τ-preopen, τ*-τ-semiopen, τ*-τ-b-open, τ*-τ-β-open, τ*-α-open, τ*-preopen, τ*-semiopen, τ*-bopen and τ*-β-open sets are introduced. Properties and the relationships of τ*-open sets are investigated. Finally, the relationships between these sets and the related concepts are investigated.
Authors and Affiliations
Hariwan Ibrahim
FLEXURAL STRENGT, WORKABILITY, COMPRESSIVE STRENGTH AND SPLIT TENSILE STRENGTH ASSESSMENTS OF LIME STONE AGGREGATE CONCRETE
Concrete is an artificial material in which the aggregates both fine and coarse are bonded together by the cement when mixed with water. The concrete has become so popular and indispensable because of its inherent...
OPTIMIZATION OF MIG WELDING PARAMETERS ON TENSILE STRENGTH OF ALUMINUM ALLOY BY TAGUCHI APPROACH
In present days Alloy of aluminum is widely used due to its versatility especially in automotive industry. Most of the component is made by casting but some may require welding too. These components are loaded static...
SUGAR FACTORY AUTOMATION USING 8051
The main aim of this paper is to design and employ of saving time and reduce human efforts in like sugar industry, foodindustry, and coal industry.Generally an industry consists of many number of electrical and electro...
HYDRODYNAMICS OF TWO-STAGE LIQUID-SOLID SEMI-FLUIDIZATION
To develop the concept of two-stage semi-fluidization on hydrodynamic characteristics viz. the bed pressure drop and formation of the top packed beds, investigation have been carried out in a two-stage semi-fl...
QR CODE BASED ENCRYPTED MATRIX REPRESENTATION FOR ERADICATING HARDWARE AND SOFTWARE KEYLOGGING
The design of secure authentication protocols is quite challenging. Involving human authentication protocols is not easy because of their limited capability of computation and memorization. Keylogging is a major p...