Here, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity
Psychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors. Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to special requirements by the
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MorePyogenic granuloma is one of the inflammatory hyperplasia seen in the oral cavity. The
present study included 10 patients with pyogenic granuloma, involving 4 males and 6 females with 1:1.5
male to female ratio. Patient ages ranged from 5 to 85 years (mean, 30 years) and half of the lesions had
pedunculated base, with surface ulceration in 10% of cases. Treatment consisted of resection, using 810
nm diode lasers. Eight patients were anesthetized during the surgical operation by local infiltration of
anesthesia. Only three patients reported mild post-operative pain within the first 24 hours of the healing
period. During the surgical operation there was no significant bleeding so clear surgical field. There was
no blee
Pyogenic granuloma is one of the inflammatory hyperplasia seen in the oral cavity. The
present study included 10 patients with pyogenic granuloma, involving 4 males and 6 females with 1:1.5
male to female ratio. Patient ages ranged from 5 to 85 years (mean, 30 years) and half of the lesions had
pedunculated base, with surface ulceration in 10% of cases. Treatment consisted of resection, using 810
nm diode lasers. Eight patients were anesthetized during the surgical operation by local infiltration of
anesthesia. Only three patients reported mild post-operative pain within the first 24 hours of the healing
period. During the surgical operation there was no significant bleeding so clear surgical field. There was
no blee
In this contribution, density functional theory-based calculations have been carried out to assess the electronic, photocatalytic and optical properties of Ce1-xTixO2 system. Ti incorporation leads to a decrease of Ce 4f states and enhancement of Ti 3d states in the bottom of conduction band. Furthermore, it was found that doping ceria with Ti-like transition metals could evidently shift the absorption of pure CeO2 towards higher wavelength range. These findings can provide some new insights for designing CeO2-based photocatalysts with high photocatalytic performance. To the best of our knowledge, this investigation calculates Mullikan’s charge transfer of Ce1-xTixO2 system for the first time. Charge transfer reveals an ionic bond between
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
This research aims at investigating pupils’ ability in using discourse markers which are identified in the English textbooks of secondary schools. Four texts are chosen from third intermediate class. The four texts are short stories of different topics.
This research hypothesizes that there are no statistical significant differences among Iraqi intermediate pupils’ ability in using textual
... Show More