This paper is concerned with the study of the fixed points of set-valued contractions on ordered metric spaces. The first part of the paper deals with the existence of fixed points for these mappings where the contraction condition is assumed for comparable variables. A coupled fixed point theorem is also established in the second part.
In the present study, the cluster concept was adopted to find points parallel to the cumulative points of any subset in topology cluster proximity spaces. The takeoff set term was given by the researcher to the set of all points. Also, an opposite definition was found for it, which is the follower set. The relation between them was found and their most important properties were highlighted. Through these two sets, new sets were built that are called, f_σ-set ,f_tσ-set ,t_fσ-set ,bushy set, scant set .
This paper consist some new generalizations of some definitions such: j-ω-closure converge to a point, j-ω-closure directed toward a set, almost j-ω-converges to a set, almost j-ω-cluster point, a set j-ω-H-closed relative, j-ω-closure continuous mappings, j-ω-weakly continuous mappings, j-ω-compact mappings, j-ω-rigid a set, almost j-ω-closed mappings and j-ω-perfect mappings. Also, we prove several results concerning it, where j Î{q, δ,a, pre, b, b}.
In this article, the additivity of higher multiplicative mappings, i.e., Jordan mappings, on generalized matrix algebras are studied. Also, the definition of Jordan higher triple product homomorphism is introduced and its additivity on generalized matrix algebras is studied.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreIn this paper, we consider new subclasses of meromorphic uniformly of multivalent functions in with fixed second coefficient, we obtain the estimation of coefficients, distortion theorems, closure theorems and some other results.
In the years recently city planning projects have been confirmed sustainable high concentration on planning streets and pedestrian paths being the most prominent component of the urban structure in the city and these me and diverse departments link the city’s sectors and serve as a space for economic, service, and social activities. On the other hand, pedestrian traffic is an essential component of the various means of transportation within the city. Suffer cities in the Middle East and Arab cities in particular are neglecting pedestrian paths in the vital urban environment. Vehicle control mechanisms on roads, and changing the uses of pedestrian paths as result of encroaching on the sidewalks designated for pedestrians. Which leads to a
... Show MoreLinear regression is one of the most important statistical tools through which it is possible to know the relationship between the response variable and one variable (or more) of the independent variable(s), which is often used in various fields of science. Heteroscedastic is one of the linear regression problems, the effect of which leads to inaccurate conclusions. The problem of heteroscedastic may be accompanied by the presence of extreme outliers in the independent variables (High leverage points) (HLPs), the presence of (HLPs) in the data set result unrealistic estimates and misleading inferences. In this paper, we review some of the robust
... Show MoreIn our research, we introduced new concepts, namely *and **-light mappings, after we knew *and **-totally disconnected mappings through the use of -open sets.
Many examples, facts, relationships and results have been given to support our work.