Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.
Internal Music is considered as a basis to form music melody that sends rapture and
ecstasy within ones selves since it occurs directly on ears ( hearing) and since it tightens the
meaning to make it penetrating into Heart. It is rhythmic organization occurred inside the text
due to movements of internal sounds since rhythm heavily depends on language and
pronunciation. Repetition adds music melody to the poetic text since it increases music in
poetry. The sounds that reoccurred either be letters or words are no more than confirmation.
Thus , repetition is artistic phenomena most poets resorted to as to diverse his subjects and
metaphors he depicts in his poetry. The repetition has achieved artistic aesthetics , mean
Diarrhea is one of the most commonly encountered minor ailments in the community pharmacies. It is associated with significant morbidity and mortality. However, the majority of pharmacists in Iraq did not manage diarrheal cases in a proper way. Therefore, the current study aimed to evaluate the benefit of a new mobile application (diarrhea management step by step) to improve the pharmacist's role in the management of diarrhea. The study was conducted from 21th September to 21th October 2021 using a pre-post design via a simulated patient (SP) technique. A validated diarrhea scenario was presented to each pharmacist by the SP twice, once before and the other after giving the mobile application to the pharmacist. Furthermore, pharmaci
... Show MoreNowadays, 3D content is becoming an essential part of multimedia applications, when the 3D content is not protected, hackers may attack and steal it. This paper introduces a proposed scheme that provides high protection for 3D content by implementing multiple levels of security with preserving the original size using weight factor (w). First level of security is implemented by encrypting the texture map based on a 2D Logistic chaotic map. Second level is implemented by shuffling vertices (confusion) based on a 1D Tent chaotic map. Third level is implemented by modifying the vertices values (diffusion) based on a 3D Lorenz chaotic map. Results illustrate that the proposed scheme is completely deform the entire 3D content accord
... Show MoreThe present study addresses adopting the organic and nutritious materials in dairy wastewater as media for cultivation of microalgae, which represent an important source of renewable energy. This study was carried out through cultivation of three types of microalgae; Chlorella sp., Synechococcus, and Anabaena. The results shows the success the cultivation of the Synechococcus and Chlorella Sp, while the Anabaena microalgae were in low-growth level. The highest growth was in the Synechococcus farm, followed by Chlorella and Anabaena. However, the growth of Synechococcus required 10 days to achieve this increase that re
... Show MoreWith the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data.
... Show MoreThis research is a new reading of some of the words in the Holy Quran, which is very old. It is a human reading in which religions are intertwined by recognizing the relationship between man and his fellow man in the unity of existence and the unity of the source of religions and the unity of language. The importance of this research in comparing some of the Arabic words has been contained among books believed by followers that it is from the one God Sunday.
When words are spoken in one way in the form of one creature, from the beginning of creation to the present day, this indicates the single origin of the languages..
The research tools were books of heavenly religions, the Quran, dictionaries and interpretations.
... Show MoreThe purpose of this paper is to introduce and prove some coupled coincidence fixed point theorems for self mappings satisfying -contractive condition with rational expressions on complete partially ordered metric spaces involving altering distance functions with mixed monotone property of the mapping. Our results improve and unify a multitude of coupled fixed point theorems and generalize some recent results in partially ordered metric space. An example is given to show the validity of our main result.
Let R be a commutative ring with identity, and W be a unital (left) R-module. In this paper we introduce and study the concept of a quasi-small prime modules as generalization of small prime modules.
Let R be a commutative ring with unity and let M, N be unitary R-modules. In this research, we give generalizations for the concepts: weakly relative injectivity, relative tightness and weakly injectivity of modules. We call M weakly N-quasi-injective, if for each f  Hom(N,ï) there exists a submodule X of ï such that f (N) ïƒ X ≈ M, where ï is the quasi-injective hull of M. And we call M N-quasi-tight, if every quotient N / K of N which embeds in ï embeds in M. While we call M weakly quasi-injective if M is weakly N-quasiinjective for every finitely generated R-module N. Moreover, we generalize some properties of weakly N-injectiv
... Show MoreLet Q be a left Module over a ring with identity ℝ. In this paper, we introduced the concept of T-small Quasi-Dedekind Modules as follows, An R-module Q is T-small quasi-Dedekind Module if,