Let f and g be a self – maps of a rational exterior space . A natural number m is called a minimal coincidence period of maps f and g if f^m and g^m have a coincidence point which is not coincidence by any earlier iterates. This paper presents a complete description of the set of algebraic coincidence periods for self - maps of a rational exterior space which has rank 2 .
The main objective of this thesis is to study new concepts (up to our knowledge) which are P-rational submodules, P-polyform and fully polyform modules. We studied a special type of rational submodule, called the P-rational submodule. A submodule N of an R-module M is called P-rational (Simply, N≤_prM), if N is pure and Hom_R (M/N,E(M))=0 where E(M) is the injective hull of M. Many properties of the P-rational submodules were investigated, and various characteristics were given and discussed that are analogous to the results which are known in the concept of the rational submodule. We used a P-rational submodule to define a P-polyform module which is contained properly in the polyform module. An R-module M is called P-polyform if every es
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and his family and companions until the Day of Judgment.
The words of God Almighty are for the sake of the greatest and greatest speech, and the scholars, may God have mercy on them, raced.
To dive into knowing the word of God and what he intended, so they wrote in it the literature and collected works in it, and explained it to those after them.
And when the noble companions, were extremely eloquent and eloquent, because the Holy Qur’an was revealed in the language of the Quraysh, and all the Arabs knew their language, they understood the Holy Qur’an and applied it p
Background: the aim of this study was to assess the 2-year pulp survival of deep carious lesions in teeth excavated using a self-limiting protocol in a single-blind randomized controlled clinical trial. Methods: At baseline, 101 teeth with deep carious lesions in 86 patients were excavated randomly using self-limiting or control protocols. Standardized clinical examination and periapical radiographs of teeth were performed after 1- and 2-year follow-ups (REC 14/LO/0880). Results: During the 2-year period of the study, 24 teeth failed (16 and 8 at T12 and T24, respectively). Final analysis shows that 39/63 (61.9%) of teeth were deemed successful (16/33 (48.4%) and 23/30 (76.6%) in the control and experimental groups, respectively wit
... Show MoreIn this paper we generalize Jacobsons results by proving that any integer in is a square-free integer), belong to . All units of are generated by the fundamental unit having the forms
our generalization build on using the conditions
This leads us to classify the real quadratic fields into the sets Jacobsons results shows that and Sliwa confirm that and are the only real quadratic fields in .
Background: Schneiderian first rank symptoms are
considered highly valuable in the diagnosis of
schneideria.
They are more evident in the acute phase of the
disorder and fading gradually with time. Many studies
have shown that the rate of these symptoms are
variable in different countries and are colored by
cultural beliefs and values.
Objectives: To find out the rate of Schneiderian first
rank symptoms among newly diagnosed schizophrenic
patients, to assess which symptom(s) might
predominate in those patients, and to find out if there
is/are any correlation(s) between the occurrence of
these symptoms and the sex of the patients.
Methods: Out of twenty-four patients with no past
psychiatric hi
In this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Throughout this paper we study the properties of the composition operator
C
p1 o
p2 o…o
pn induced by the composition of finite numbers of special
automorphisms of U,
pi (z) i
i
p z
1 p z
Such that pi U, i 1, 2, …, n, and discuss the relation between the product of
finite numbers of automorphic composition operators on Hardy space H2 and some
classes of operators.
Several attempts have been made to modify the quasi-Newton condition in order to obtain rapid convergence with complete properties (symmetric and positive definite) of the inverse of Hessian matrix (second derivative of the objective function). There are many unconstrained optimization methods that do not generate positive definiteness of the inverse of Hessian matrix. One of those methods is the symmetric rank 1( H-version) update (SR1 update), where this update satisfies the quasi-Newton condition and the symmetric property of inverse of Hessian matrix, but does not preserve the positive definite property of the inverse of Hessian matrix where the initial inverse of Hessian matrix is positive definiteness. The positive definite prope
... Show More