The aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreThis research aims to develop new spectrophotometric analytical method to determine drug compound Salbutamol by reaction it with ferric chloride in presence potassium ferricyanide in acid median to formation of Prussian blue complex to determine it by uv-vis spectrophotmetric at wavelengths rang(700-750)nm . Study the optimal experimental condition for determination drug and found the follows: 1- Volume of(10M) H2SO4 to determine of drug is 1.5 ml . 2- Volume and concentration of K3Fe(CN)6 is 1.5 ml ,0.2% . 3- Volume and concentration of FeCl3 is 2.5ml , 0.2%. 4- Temperature has been found 80 . 5- Reaction time is 15 minute . 6- Order of addition is (drug + K3Fe(CN)6+ FeCl3 + acid) . Concentration rang (0.025-5 ppm) , limit detecti
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreIn the beta decay process, a neutron converts into a proton, or vice versa, so the atom in this process changes to a more stable isobar. Bethe-Weizsäcker used a quasi-experimental formula in the present study to find the most stable isobar for isobaric groups of mass nuclides (A=165-175). In a group of isobars, there are two methods of calculating the most stable isobar. The most stable isobar represents the lowest parabola value by calculating the binding energy value (B.E) for each nuclide in this family, and then drawing these binding energy values as a function of the atomic number (Z) in order to obtain the mass parabolas, the second method is by calculating the atomic number value of the most stable isobar (ZA). The results show
... Show MoreThe long-term monitoring of land movements represents the most successful application of the Global Navigation Satellite System (GNSS), particularly the Global Positioning System. However, the application of long term monitoring of land movements depends on the availability of homogenous and consistent daily position time series of stations over a period of time. Such time series can be produced very efficiently by using Precise Point Positioning and Double Difference techniques based on particular sophisticated GNSS processing softwares. Nonetheless, these rely on the availability of GNSS products which are precise satellite orbit and clock, and Earth orientation parameters. Unfortunately, several changes and modifications have been mad
... Show MoreThe aim of this work is to provide an efficient selection technique as a part of planning process to guide the decision makers to decide the preferences of one supplier over another for purchasing lab instruments in education domain. Fuzzy Analytical Hierarchy Process has used as a multi-criteria decision process, as an industrial engineering tool with certain emphasis on the qualitative aspects required to the decision makers. While the concept of degree of possibility for each criterion is used to reach its relative weights, a specific methodology created to reach the final objective decision of supplier selection. A questionnaire form was developed and distributed to five universities located in Baghdad province with a total
... Show MoreBackground: lip lengthening procedure is one of the surgical options for the correction of gummy smile in patients with short upper lip. Methods: A comparative clinical study was conducted on 15 patients requiring lip lengthening procedure for the esthetic correction of excessive gingival exposure with gummy smile. Scalpel was used in seven patients and diode laser in the remaining eight patients. Under infiltration anesthesia, about one cm strip of mucosa was excised at the vestibular depth and the mucosa of the lip was sutured to the alveolar mucosa. Results: The diode laser group demonstrated less postoperative pain and swelling. Regarding postoperative ecchymosis, three patients in the scalpel group developed ecchymosis and no cases
... Show More