The focus of this paper is the presentation of a new type of mapping called projection Jungck zn- Suzuki generalized and also defining new algorithms of various types (one-step and two-step algorithms) (projection Jungck-normal N algorithm, projection Jungck-Picard algorithm, projection Jungck-Krasnoselskii algorithm, and projection Jungck-Thianwan algorithm). The convergence of these algorithms has been studied, and it was discovered that they all converge to a fixed point. Furthermore, using the previous three conditions for the lemma, we demonstrated that the difference between any two sequences is zero. These algorithms' stability was demonstrated using projection Jungck Suzuki generalized mapping. In contrast, the rate of convergence of these algorithms was demonstrated by contrasting the rates of convergence of the various algorithms, leading us to conclude that the projection Jungck-normal algorithm is the fastest of all the algorithms mentioned above.
This study aimed to improve the microencapsulation technique using a type coating the encapsulation Layer by Layer, which provide the best protection for life Lactobacillus casei in the extrusion method and use the microencapsulation of materials of the protein concentrated by protein 80% and the coating with alginate and chitosan have the results showed the variation in the difference of the binding process encapsulation yield among the types of coating through. by studying of these the effect o stability of the bio probiotic free cell and the three types coated towards three different concentrations from bile salts 0, 0.3, 0.5 and 0.7% when the periods of time different of zero and two and three hours at incubation the recorded
... Show MoreBackground: The Initial (primary) stability is one of the factors that play an important role in the success of the dental implants. The purpose of this study was to evaluate the initial stability of dental implant with horizontal plate by using five analytical tests: insertion torque, removal torque, resonance frequency analysis, push-in test and pull-out test. Materials and methods: Two different lengths of dental implants (5mm and 10mm) were tested in this study; each dental implant was 4mm in diameter with a square threads shape of 1mm pitch and 0.5mm depth. The crestal area was 4.2mm diameter contained a right angle margin circumferential ring while the apical area was tapered with two self-tapping grooves. In this study, the initial s
... Show MoreConcentrations 25, 50 and 100 mg of nano-capsules linolenic acid and non-capsulated fatty acid for 1kg of Milk was used for yogurt manufacture. The results showed no significant differences in the ratio of titration acidity and pH values between all processed treatments at the beginning and during of period storage. The treatments was added to it coated omega-3 by nano method were the least exposed to the oxidation process from the non-capsules omega-3, And for shield of The poly lactic acid had a significant role in the protection of alpha-linolenic acid against lipolysis by the formation of a protective layer to protect the acid from the activity of lipases enzymes, and the addition of fatty acid linolenic to milk was determined the gr
... Show MoreAbstract:
The paper aims to measure an aggregated banking stability index reflecting the degree of stability of the banking system to help policy makers to take the necessary actions to avoid financial crises facing banks and to achieve a banking system with high efficiency in terms of banking risk.
Therefore, the problem of paper is that the Central Bank of Iraq did not seek until 2016 to build a aggregated index for the purpose of identifying the stability of the banking situation in Iraq, but rather on the adoption of scattered indicators, which depend on the mechanism of relative changes in those indicators for the purpose of identifying the situation of b
... Show MoreThe current research aims at extracting the standard characteristics of the emotional balance of the university students according to the response theory. This was accomplished by following accredited scientific steps, to achieve this goal, the researcher followed scientific steps in the procedures of the analysis of the scale. She translated the scale from English to Arabic and then made a reverse translation. it was presented to a committee of experts in English to ensure and verify the validity of the paragraphs logically and prove the face validity of the scale, which consists of (30) paragraphs, it was presented to (6) experts who are specialists in the educational and psychological sciences and in the light of their observations ha
... Show MoreTechnological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,
... Show MoreAbstract: This research aims to investigate and analyze the most pressing issues facing the Iraqi economy, namely economic stability and inclusive growth Consequently, the present study investigates the effect of inflation and unemployment, which are significant contributors to economic instability, on inclusive growth dimensions such as GDP, education, health, governance, poverty, income inequality, and environmental performance. From 1991 to 2021, secondary data were collected using World Bank Indicators (WDI) and Organization for Economic Cooperation and Development (OECD) databases. The researchers also employed the autoregressive distributed lag (ARDL) model to determine the relationship between variables. The study revealed that fluct
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe flavonoid rutin is the main content of the a queous extract of
the Iraqi plant Alhagi graecorum (family Leguminosae) which was
given to patients with different dental diseases and gave successful
results In this investigation , the amount of rutin is determined and was
found to be 4mg/100gm of the dried plant and it is equivalent to
4mg/500ml (0.8mg/100ml) of the mouthwash formula which was
prepared in this study This study reported for the first time the expiration date of rutin
in the prepared formula and was found to be 2.1 years. It also reported
for the first time that the ionic strength, buffer type and buffer concentration had no effect on the hydrolysis of rutin. Photochemical decomposition of