Let be an n-Banach space, M be a nonempty closed convex subset of , and S:M→M be a mapping that belongs to the class mapping. The purpose of this paper is to study the stability and data dependence results of a Mann iteration scheme on n-Banach space
The current research aims to identify the occupational stresses of doctors who are working in governmental hospitals according to the variables of gender and career ranking. The researcher adopted a scale to measure the occupational stress of (1088) doctors (561 males and 527 females) working in governmental hospitals. The results have shown that doctors have a high level of professional stress, but there is no significant difference between doctors in terms of gender. However, there were significant differences in favor of novice residents.
The current research aims to identify the impact of the amputated story style in the collection of sixth graders in elementary in the written expression subject.
The researcher, intentionally, chose Al-Ameen primary hybrid school which belongs to the directorate of education in Baghdad / Karkh first. The number of people of the sixth grade three classes. The researcher chose the two classes randomly to represent one of the experimental group, the number (32) pupils (male and female) have studied the expression subject by the amputated story style. Other control group, the number (32) pupils studied according to the traditional method.
The researcher prepared the lesson plans and presented to the experts, the researc
... Show MoreA large amount of thermal energy is generated from burning hazardous chemical wastes, and the temperature of the flue gases in hazardous waste incinerators reaches up to (1200 °C). The flue gases are cooled to (40°C) and are treated before emission. This thermal energy can be utilized to produce electrical power by designing a system suitable for dangerous flue gases in the future depending on the results of much research about using a proto-type small steam power plant that uses safe fuel to study and develop the electricity generation process with water tube boiler which is manufactured experimentally with theoretical development for some of its parts which are inefficient in experimental work. The studied system gen
... Show MoreTransmission lines are generally subjected to faults, so it is advantageous to determine these faults as quickly as possible. This study uses an Artificial Neural Network technique to locate a fault as soon as it happens on the Doukan-Erbil of 132kv double Transmission lines network. CYME 7.1-Programming/Simulink utilized simulation to model the suggested network. A multilayer perceptron feed-forward artificial neural network with a back propagation learning algorithm is used for the intelligence locator's training, testing, assessment, and validation. Voltages and currents were applied as inputs during the neural network's training. The pre-fault and post-fault values determined the scaled values. The neural network's p
... Show MoreOur main interest in this study is to look for soft semi separations axioms in soft quad topological spaces. We talk over and focus our attention on soft semi separation axioms in soft quad topological spaces with respect to ordinary points and soft points. Moreover study the inherited characteristics at different angles with respect to ordinary points and soft points. Some of their central properties in soft quad topological spaces are also brought under examination.
The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreAutomatic document summarization technology is evolving and may offer a solution to the problem of information overload. Multi-document summarization is an optimization problem demanding optimizing more than one objective function concurrently. The proposed work considers a balance of two significant objectives: content coverage and diversity while generating a summary from a collection of text documents. Despite the large efforts introduced from several researchers for designing and evaluating performance of many text summarization techniques, their formulations lack the introduction of any model that can give an explicit representation of – coverage and diversity – the two contradictory semantics of any summary. The design of gener
... Show MoreHumans are exposed to nuclear radiations every day, and these radiations are both natural and artificial. When the body tissues are exposed to nuclear radiation, free radicals are formed, which are responsible for cancer development. In this research, silver nanoparticles were synthesized by electrical explosion wire method. Nanoparticles were added to deionized water that contained free radicals before and after exposure to gamma rays. The obtained results indicate that the silver nanoparticles have antioxidant potential through possessing free radical scavenging activity, as they can donate electron to free radicals and become neutralize. Then, these nanoparticles were injected to mice before and after their irradiation with gamma ray.
... Show MoreIt is no doubt that dialogue is a behavior for human communication. It varies according to the place and occasion that requires it. Dialogues are of two types: positive purposeful and negative non-purposeful. The study aims to shed light on those patterns of dialogues contained in the Quranic stories represented by the characters and events participating in that dialogue activity. To expand the circle of social relations, and in order to make these relationships a success, there are several rules that must be adhered to.For instance, the dialogue should not be tolerant to a personal opinion, or prolonged, or should not deviate from its text. The expression of polite dialogue has been raised in recognition of these dialogue et
... Show More