R. Vasuki [1] proved fixed point theorems for expansive mappings in Menger spaces. R. Gujetiya and et al [2] presented an extension of the main result of Vasuki, for four expansive mappings in Menger space. In this article, an important lemma is given to prove that the iteration sequence is Cauchy under suitable condition in Menger probabilistic G-metric space (shortly, MPGM-space). And then, used to obtain three common fixed point theorems for expansive type mappings.
This piece of research work aims to study one of the most difficult reaction and determination due to continuous and rapid variation of reaction products and the reactants. As molybdenum (VI) aid in the decomposition of hydrogen peroxide in alkaline medium of ammomia, thus means a continuous liberation of oxygen which cuases and in a continuous manner a distraction in the measurement process. On this basis pyrogallol was used to absorbe all liberated oxygen and the result is an a clean undisturbed signals. Molybdenum (VI) was determined in the range of 4-100 ?g.ml-1 with percentage linearity of 99.8% or (4-300 ?g.ml-1 with 94.4%) while L.O.D. was 3.5 ?g.ml-1. Interferring ions (cations and anions) were studied and their main effect was red
... Show MoreThis research aims to find out the phonemic, dialect and semantic ailments that were interrogated by the book of the parsing of thirty surahs of the Noble Qur’an by Ibn Khalawiyeh, by examining some phonemic phenomena of Qur’anic expressions and their explanatory relationships that resulted in their occurrence, such as substitution and compression, as the sounds in a word are affected by one another, especially during performance and composition. This influence and influence is the tendency of the human being to the law of ease, facilitation, and the reduction of muscular effort in speech often, all for the purpose of obtaining phonemic harmony for the compound letters; To facilitate pronunciation; And get rid of the muscular effort
... Show MoreMost dinoflagellate had a resting cyst in their life cycle. This cyst was developed in unfavorable environmental condition. The conventional method for identifying dinoflagellate cyst in natural sediment requires morphological observation, isolating, germinating and cultivating the cysts. PCR is a highly sensitive method for detecting dinoflagellate cyst in the sediment. The aim of this study is to examine whether CO1 primer could detect DNA of multispecies dinoflagellate cysts in the sediment from our sampling sites. Dinoflagellate cyst DNA was extracted from 16 sediment samples. PCR method using COI primer was running. The sequencing of dinoflagellate cyst DNA was using BLAST. Results showed that there were two clades of dinoflag
... Show MoreViolence is one of the most serious threats facing societies because it affects their internal structure and threatens the security and stability of society. It is classified as one of the types of security crises that are emerging in Arab and Islamic societies in particular, and in most countries of the world in general.
The threat of this crisis is increasing. Terrorism is considered as one of the most serious aspects of that all the countries of the world, currently, suffer from. The terrorism has begun to penetrate deep into society in one way or another starting from the Second World War, which led to the emergence of leftist movements in Western Europe, Japan, France, Italy and other countries as a result of emerging ideas
... Show MoreThe research aimed to prepare a measure of the importance of enlightenment, academic education, and applied skills for third-stage female students, including teaching methods from their point of view/College of Education and Sports Sciences/University of Baghdad/Al-Jadriyah. The researchers used descriptive description in the comprehensive research procedures, an appropriate methodology in achieving the research objectives, sufficient for interpretations, how important is the academic teacher’s knowledge of teaching methods for student learning, what are the roles that the learners have acquired from the academic teacher. The scale of importance and horror consists of 15 items. The research population includes female students of t
... Show MoreMultiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show More