R. Vasuki [1] proved fixed point theorems for expansive mappings in Menger spaces. R. Gujetiya and et al [2] presented an extension of the main result of Vasuki, for four expansive mappings in Menger space. In this article, an important lemma is given to prove that the iteration sequence is Cauchy under suitable condition in Menger probabilistic G-metric space (shortly, MPGM-space). And then, used to obtain three common fixed point theorems for expansive type mappings.
Bladder cancer (BC) is the predominant malignant neoplasm in the urinary system and ranks as the tenth most prevalent malignant tumor worldwide. Compared with females, males displayed a four-fold more common incidence of bladder cancer. It mainly affects men. Bladder cancer is the fourth most prevalent neoplasm in males. The most important protein that makes up high density lipoprotein (HDL), ApoA-I apolipoprotein A1 is essential in regulating the right amount of cholesterol. Multiple inquiries have demonstrated that APOA1 plays a pivotal role in the progression, infiltration, and spread of tumors. Objectives. The objective of this study was to measure the level of urine to serum apolipoprotein A1 in patients suffering from bladder
... Show MoreIn This paper, we have been approximated Grűnwald-Letnikov Derivative of a function having m continuous derivatives by Bernstein Chlodowsky polynomials with proving its best approximation. As well as we have been solved Bagley-Torvik equation and Fokker–Planck equation where the derivative is in Grűnwald-Letnikov sense.
The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreAZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
The study is done in the period between (February 20 and October 20) by using ten adult quail Coturnix coturnix (Linnaeus, 1758). The sections are preparing by paraffin method then stain in Harris haematoxylin-eosin. The histological aspects of spinal cord in quail (Coturnix coturnix) the white matter is in the outer part, while the gray matter is arranged in from of X represents its internal part, the dorsal region is called the dorsal horns while the ventral region is called the ventral horns and the central canal cavity, the spinal cord areas appeared as follows: The medial column, column of von Lenhossek, lateral column, dorsal magnocellular column and marginal paragriseal, columns are also called Hoffmann’s nuclei.
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show Moreالعلاقة بين تعبير المعلمات المناعية ل (P53) وعدم استقرار الساتل الميكروي (MSI) مع العوامل السريرية المرضية لسرطان المعدة الغدي باستخدام الكيمياء النسيجية المناعية. الخلاصة الخلفية: يحدث سرطان المعدة الغدي بسبب عدم استقرار الكروموسومات، وطفرات TP53، واختلال الصيغة الصبغية، والانتقالات، والجينات الورمية الأولية، والتغيرات الجينية المثبطة للورم.عدم استقرار الساتل الميكروي(MSI) يسبب فشل إصلاح عدم تطابق الحم
... Show MoreObjectives: This study aims to broaden our knowledge of the role of eDNA in bacterial biofilms and antibiotic-resistance gene transfer among isolates. Methods: Staphylococcus aureus, E. coli, and Pseudomonas aeruginosa were isolated from different non-repeated 170 specimens. The bacterial isolates were identified using morphological and molecular methods. Different concentrations of genomic DNA were tested for their potential role in biofilms formed by study isolates employing microtiter plate assay. Ciprofloxacin resistance was identified by detecting a mutation in gyrA and parC. Results: The biofilm intensity significantly decreased (P < 0.05) concerning S. aureus isolates and insignificantly (P > 0.05) concernin
... Show More