R. Vasuki [1] proved fixed point theorems for expansive mappings in Menger spaces. R. Gujetiya and et al [2] presented an extension of the main result of Vasuki, for four expansive mappings in Menger space. In this article, an important lemma is given to prove that the iteration sequence is Cauchy under suitable condition in Menger probabilistic G-metric space (shortly, MPGM-space). And then, used to obtain three common fixed point theorems for expansive type mappings.
The present study deals with the effect of teaching speaking Strategies (SS) on
EFL Iraqi College students. The use of speaking strategies not only solves learners’
communication problems, but also enhances the learner’s interaction in target language,
and improves their oral proficiency .The aim of the study is to find out the effect of
teaching SS used by EFL College students .The learner of the first stage is population of
the study at the Department of English, College of Education /Ibn-Rushd .The sample
consists of (60) students distributed on experimental group(A) as well as control
group(B) each group contains (30) students . In order to achieve the aim of the study,
questionnaire has been constructed t
the behavior of the first-order black and gray solitons propagtedin optical fiber in the presence of frequency chirp is studied analytically and numerically results show that phase profile of black solitons changes abruptly
The objective of this paper is to study the stability of SIS epidemic model involving treatment. Two types of such eco-epidemiological models are introduced and analyzed. Boundedness of the system is established. The local and global dynamical behaviors are performed. The conditions of persistence of the models are derived.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreEmpirical research in the disciplines of art and design has started to escalate and gather consideration within the academic community over the past few decades. However, still, graphic design tends to be a topic extremely under-researched by scholarly persons. Profound research in the field of graphic design extends far beyond the works produced by the designer himself (Khoury, 2009, p.844). In order to develop a clear insight, one needs to delve deep into the subcategories that the diverse field of graphic design is comprised of, including illustration, typography, interaction design, branding and even the impact of notable, eminent institutes from around the world that have taken the budding artists for quite a long time (Walke
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MorePraise be to God, Lord of the worlds, and the best of prayers, and the completion of the blessing of our master Muhammad Al-Hadi Al-Amin, his family and companions, the righteous and those who followed his path and guided him to the day of judgment.
And after:
It is God's human honor that he has legalized marriage and made optimal goals and intentions for her:
1 establish a safe and reassuring life between the husband and his wife based on the tranquility and love and compassion is achieved through satisfying the instincts of the road project from the verse: and that He created for you mates from among yourselves to find repose in them and put between you affection and mercy in this are Signs for those who reflect ()
By driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root gives invertible model and when the sign is negative means the root gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when
The correct and sincere process of socialization is working on appropriate social climate in
which this process is the provision, and the climate is achieved in the presence of a positive
environment free of negatives and contradictions, but when there is a socialization processes
inadequate and contradictory was not based on the principles of punishment and reward nor a
balance between methods soft and intensity of treatment and interaction with small and
adolescent does not require intensive social care formulas do not create the conditions
essential items required by the successful and effective socialization, the young and the young
people who are going through in such Altanisah and educational operations will be
Among the available chaotic modulation schemes, differential chaos shift keying (DSCK) offers the perfect noise performance. The power consumption of DCSK is high since it sends chaotic signal in both of 1 and 0 transmission, so it does not represent the optimal choice for some applications like indoor wireless sensing where power consumption is a critical issue. In this paper a novel noncoherent chaotic communication scheme called differential chaos on-off keying (DCOOK) is proposed as a solution of this problem. With the proposed scheme, the DCOOK signal have a structure similar to chaos on-off keying (COOK) scheme with improved performance in noisy and multipath channels by introducing the concept of differential coherency used in DCS
... Show More