In this paper, we study the common diskcyclic vectors for a path of diskcyclic operators. In particular, if is a path of diskcyclic operators, we show that under certain conditions the intersection of diskcyclic vectors for theses operators is a dense set.
The aim of this work is to give the new types for diskcyclic criterion. We also introduced the case if there is an equivalent relation between a diskcyclic operator and T that satisfies the diskcyclic criterion. Moreover, we discussed the condition that makes T, which satisfies the diskcyclic criterion, a diskcyclic operator
In this paper,there are new considerations about the dual of a modular spaces and weak convergence. Two common fixed point theorems for a -non-expansive mapping defined on a star-shaped weakly compact subset are proved, Here the conditions of affineness, demi-closedness and Opial's property play an active role in the proving our results.
Three plant species were picked randomly and their alcoholic extracts have been screened to know their effects on the phagocytic capability and intracellular killing of yeast by human peripheral macrophages. Macrophage cultures were incubated with different concentration of each plant extract: for 15 min., 30 min .and 45 min. The phagocytes activity in Iresine herbstii extract was significantly (p?0.05) increased with increasing dose and time of incubation. In Mentha piperita extract, increasing in dose and time of incubation leads to elevate phagocytic capbility, especially in the dose of 20% and 25% of plant extract, perhaps because the antimicrobial and antiviral activities of this plant, as well as strong antioxidant and antitumor act
... Show MoreThe study aimed to shed light on the provisions of the lease of the common money as a whole or the common share, these provisions still raise problems when applied, and the fact is that the lease contract concluded by all or one of the partners with others is based on the exchange of a clear benefit, which is the exploitation of the real estate that is a circle between these partners Considering that they are one person in the eyes of the law and he is the landlord or by one of their partners, the researcher compared the texts of the articles of the Journal of Justice Rulings - from which most of the rulings were derived because they are applied in Palestine - with the texts of the Egyptian Civil Code No. 131 of 1948; This is to make a b
... Show MoreBased on collections made during March to September 2012. A totals of 58 species belong to 33 genera were identified from extra north to extra south of Erbil governorate, among them 30 species are registered as a new record to flora of Iraq. Most attention was paid to the most common and abundant lichens that present almost in most locations, which were Collema cristatum, Diploschistes scruposus, Lecanora dispersa, Lecanora murales, Pertusaria flavicunda, Placidium lacinulatum, Thelomma californicum and Verrucaria Maura.
Zainab M. Al-Bahrani Department of Oral Diagnosis, College of Dentistry, University of Baghdad, Baghdad, Iraq.Corresponding author: Zainab M. Al-Bahra...
R. Vasuki [1] proved fixed point theorems for expansive mappings in Menger spaces. R. Gujetiya and et al [2] presented an extension of the main result of Vasuki, for four expansive mappings in Menger space. In this article, an important lemma is given to prove that the iteration sequence is Cauchy under suitable condition in Menger probabilistic G-metric space (shortly, MPGM-space). And then, used to obtain three common fixed point theorems for expansive type mappings.
The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou
... Show More