In this paper, we proved coincidence points theorems for two pairs mappings which are defined on nonempty subset in metric spaces by using condition (1.1). As application, we established a unique common fixed points theorems for these mappings by using the concept weakly compatible (R-weakly commuting) between these mappings.
Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show MoreA binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreThis study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most
... Show MoreThe article includes the concept of aesthetics through what has been dealt with in the literature by philosophers and researchers who have addressed this concept in an attempt to derive indicators of aesthetics. The article adopted a descriptive and analytical methodology by reviewing recent literature on the concept of aesthetics and its relation to urban planning and design issues. Many subjective and objective aesthetics indicators have been identified, some of which are classified under real aesthetics, and some under fake aesthetics. The indicators were applied to the Kufa Mosque complex and Sahla Mosque complex as a comparative case study. It was found that the indicators of real aesthetics have a higher weight in determining
... Show MoreThis research was carried out in quail in the laboratory of histopathology diseases during four months. The objectives of this study was to detecting the effects of the addition of the alcohol extract of ginger to ovary tissue of quail. The two groups of birds were in almost similar weights and were placed in cages. Each group consisted of 8 quails. The first group (control group) fed on regular feeding without adding alcoholic extract of ginger. The second group (treated group) fed on the same normal food after adding the alcohol extract of ginger at a concentration of 300 mg / kg. The results indicated that ginger have positive effects on folliculogenesis.
This study aimed to investigate the impact of implementing Glycetin by injection on the productive features of local Iraqi chickens. 100 female hens and 20 roosters from a local Iraqi chicken population, at age 26 weeks. The sample was divided into three groups, in addition to a control group. Each experimental group had 25 female hens, with the same procedure being performed for each individual hen, and 20 roosters, which were reared separately for the purpose of artificial insemination. The avian specimens were housed in separate enclosures, and the experimental conditions were allocated as follows: the initial condition (Control Group) did not receive any injections, whereas condit
The present study aimed to investigated Giardia duodenalis in cattle in some different areas of Wasit province by using molecular study and verification of the genotype of Giardia duodenalis. Collected one hundred fecal samples from cattle, the result showed that the rate of infection was 83% (100) . DNA was extracted from the 100 positive samples from the cattle then amplified using the special tris-phosphatesomerase gene for genotyping A and B. The result of type A infection was (69%) and (45%) of the genotype B. The purpose of this study was to investigate the genotypes of cattle in Wasit province and compare them with previous sources at the NCBI data bank.
One of the most opportunistic mycosis globally is the Candida ssp., which is considered as the most agent that cause nosocomial urinary tract infections (UTIs), oral candidiasis and genitourinary candidiasis. This study included 100 samples of Iraqi subjects suffering from urinary tract infections. Identification of Candida have been done by different methods such as; characteristic of colony on culture, gram stain, and microscopically. This study aimed to isolation and identification of Candida spp from urine sample of UTI patients and find the relevance of ages and blood group of patients with the infections rate, also determine the effect of age on ESR and CRP levels in the patients. The results showed the higher frequency of
... Show MorePsychosocial Alienation is a modern concept that arises from the capitalist and materialistic conceptions of individuals. The evergrowing competitive nature of domestic societies crystallised the concept in its modern form. The intensity of the rapid changes in the urbanised societies prevents the individuals from exploring their inner selves. Thus, a new generation is created with an alienation crisis which is reflected inward towards the self and outwards toward society. Alan Ayckbourn (1939), A British playwright, presents Alienated characters inspired by his life on and off stage. He explores their Alienation and their path toward recovery and self-realization. A Brief History of Women (2017) Ayckbourn explores the depth of the individu
... Show More