In the context of normed space, Banach's fixed point theorem for mapping is studied in this paper. This idea is generalized in Banach's classical fixed-point theory. Fixed point theory explains many situations where maps provide great answers through an amazing combination of mathematical analysis. Picard- Lendell's theorem, Picard's theorem, implicit function theorem, and other results are created by other mathematicians later using this fixed-point theorem. We have come up with ideas that Banach's theorem can be used to easily deduce many well-known fixed-point theorems. Extending the Banach contraction principle to include metric space with modular spaces has been included in some recent research, the aim of study proves some properties of Banach space.
One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreLying is considered a dangerous tendency among children if it has become a habit. It results in many social problems, such as child’s loss of confidence, lack of others’ respect to him, and his lack of respect to the desired values of the society, such as honesty and trust. Consequently, he will be led to a deviation when he becomes old; especially if the child’s socially unaccepted behavior has not been directed. The research, thus, aims to examine the causes of lying in the most important stage of children’s life; that is, between (4-6) years. Such an aim helps to know about the individual reasons of lying among males and females from teachers’ perspectives. To meet the objective of the study, a number of (128) children
... Show MoreThis article describes how to predict different types of multiple reflections in pre-track seismic data. The characteristics of multiple reflections can be expressed as a combination of the characteristics of primary reflections. Multiple velocities always come in lower magnitude than the primaries, this is the base for separating them during Normal Move Out correction. The muting procedure is applied in Time-Velocity analysis domain. Semblance plot is used to diagnose multiples availability and judgment for muting dimensions. This processing procedure is used to eliminate internal multiples from real 2D seismic data from southern Iraq in two stages. The first is conventional Normal Move Out correction and velocity auto picking and
... Show MoreThe aim of the current research is to know the degree to which middle school teachers and female teachers in the southern border schools use electronic educational alternatives in the field of education from their point of view and its relationship to some variables, and to achieve this goal, a random sample of (200) teachers was selected in southern border schools, and a questionnaire was prepared to collect The data, as well as the descriptive approach was used to achieve this goal. T-test and analysis of variance were used for the statistical treatment. The results concluded that the educational courses provided to male and female teachers are not sufficient. It has also been concluded that the use of electronic educational alternativ
... Show MoreThis contribution evaluates the influence of Cr doping on the ground state properties of SrTiO3 Perovskite using GGA-PBE approximation. Results of the simulated model infer agreement with the previously published literature. The modification of electronic structure and optical properties due to Cr3+ doping levels in SrTiO3 has been investigated. Structural parameters infer that Cr3+ doping alters the electronic structures of SrTiO3 by shifting the conduction band through lower energies for the Sr and Ti sites. Substituting Ti site by Cr3+ results the energy gap in being eliminated revealing a new electrical case of conducting material for the system. Furthermore, it has been noticed that Cr doping either at Sr or Ti positions could effectiv
... Show MoreThis study aims at discussing how gender differences might affect communication among people. For this purpose, several TV interviews are selected and examined on the discourse level. Developing a model of analysis ,is found that certain linguistics have been used by male speakers ,whereas different aspects have been utilized my female speakers like deictic expressions and lexical items of emotion and delicacy .
Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r
... Show More