R. Vasuki [1] proved fixed point theorems for expansive mappings in Menger spaces. R. Gujetiya and et al [2] presented an extension of the main result of Vasuki, for four expansive mappings in Menger space. In this article, an important lemma is given to prove that the iteration sequence is Cauchy under suitable condition in Menger probabilistic G-metric space (shortly, MPGM-space). And then, used to obtain three common fixed point theorems for expansive type mappings.
The current study examined the effect of different sample sizes to detect the Item differential functioning (DIF). The study has used three different sizes of the samples (300, 500, 1000), as well as to test a component of twenty polytomous items, where each item has five categories. They were used Graded Response Model as a single polytomous item response theory model to estimate items and individuals’ parameters. The study has used the Mantel-Haenszel (MH) way to detect (DIF) through each case for the different samples. The results of the study showed the inverse relationship between the sample size and the number of items, which showed a differential performer.
Polycystic ovary syndrome (PCOS) is the most endocrine problem in women of regenerative age. PCOS women typically belong to an age and sex group which is at higher risk for severe coronavirus disease (COVID-19). COVID-19 targets cells through angiotensin-converting enzyme 2 (ACE2) receptor presents on cells in veins, lungs, heart, digestion tracts, and kidneys. Renin-Angiotensin System (RAS) over activity has likewise been described in metabolic disorders; type 2 diabetes mellitus (T2DM), and conditions shared by women with polycystic ovary condition. The point of this study is to know the job of renin and ACE2 in PCOS and coronavirus and its relationship with hormones and other metabolic parameters related. The study groups consist of 1
... Show MoreBackground: One of the unique prosthesis for tooth or teeth replacement is the dental implant. Our attempt is using a biomaterial system that is easily obtained and applicable and has the ability to provoke osteoinductive growth factor to enhance bone formation at the site of application. One of these natural polymers is hyaluronic acid. Material and methods: Sixty machined surface implants from commercially pure titanium rod inserted in thirty NewZealand rabbits. Two implants placed in both tibia of each rabbit. The animals scarified at 1, 2 and 4 weeks after implantation (10 rabbits for each interval). For all of animals the right tibia’s implant was control (uncoated) and the left one was experimental (coated with 0.1ml Hyaluro
... Show MoreAcidizing is one of the most used stimulation techniques in the petroleum industry. Several reports have been issued on the difficulties encountered during the stimulation operation of the Ahdeb oil field, particularly in the development of the Mishrif reservoir, including the following: (1) high injection pressures make it difficult to inject acid into the reservoir formation, and (2) only a few acid jobs have been effective in Ahdeb oil wells, while the bulk of the others has been unsuccessful. The significant failure rate of oil well stimulation in this deposit necessitates more investigations. Thus, we carried out this experimental study to systematically investigate the influence of acid treatment on the geomechanical properties of Mi4
... Show MoreDiabetes mellitus (DM) is the most common endocrine disorder and one of the highly progressive diseases which is indicated by high blood sugar (hyperglycemia). The present study aims to study the effects of treatment with zinc and vitamin C on glycemic profile [fasting blood sugar (FBS), glycated haemoglobin (HbA1C), and insulin hormone level] in type 2 diabetic patients. The study included 56 diabetic patients [30 without foot ulcers (15 without zinc and vitamin C supplements, 15 with zinc and vitamin C supplements) and 26 with foot ulcers (15 without zinc and vitamin C supplements, 11 with zinc and vitamin C supplements)]. Also, 15 healthy persons were used as a control group. The patients were enrol
... Show MoreOne of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreThe use of varied quantities of orphenadrine to protect stainless steel against corrosion in an acidic media at 298 K has been investigated. It was observed that when the drug's concentration is increased, the drug's speed of corrosion lowers. The data of inhibition efficiency (percent IE) in the presence of orphenadrine drug and corrosion resistance showed that the highest protection efficiency was achieved with the best concentration, and that the corrosion rate decreased with increasing orphenadrine drug concentrations, making it a good inhibitor for stainless steel in an acidic environment. The theoretical investigation proved the efficiency of the drug for inhibition, as the drug is absorbed on the surface of the stainless st
... Show MoreDirectional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show More