The best proximity point is a generalization of a fixed point that is beneficial when the contraction map is not a self-map. On other hand, best approximation theorems offer an approximate solution to the fixed point equation . It is used to solve the problem in order to come up with a good approximation. This paper's main purpose is to introduce new types of proximal contraction for nonself mappings in fuzzy normed space and then proved the best proximity point theorem for these mappings. At first, the definition of fuzzy normed space is given. Then the notions of the best proximity point and - proximal admissible in the context of fuzzy normed space are presented. The notion of α ̃–ψ ̃- proximal contractive mapping is introduced. After that, the best proximity point theorem for such type of mapping in a fuzzy normed space is state and prove. In addition, the idea of α ̃–ϕ ̃-proximal contractive mapping is presented in a fuzzy normed space and under specific conditions, the best proximity point theorem for such type of mappings is proved. Furthermore, some examples are offered to show the results' usefulness.
Chalcogenide glasses SeTe have been prepared from the high purity constituent elements .Thin films of SeTe compound have been deposited by thermal evaporation onto glass substrates for different values of film thickness . The effect of varying thickness on the value of the optical gap is reported . The resultant films were in amorphous nature . The transmittance spectra was measured for that films in the wavelength range (400-1100) nm . The energy gap for such films was determined .
Isthmus life and prepare for it
Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.
A new concrete rheometer is introduced including its innovation, actual design, working rules,
calibration, and reliability. A modified design of Tattersall two-point device is created. Some of
components are purchased from local and foreign markets, while other components and the
manufacturing process are locally fabricated. The matching viscosity method of determining the mixer
viscometer constants is demonstrated and followed to relate torque and rotational speed to yield stress
and viscosity (Bingham parameters). The calibration procedures and its calculation are explained.
Water is used as a Newtonian fluid, while; cement paste (cement + water) with w/c ratio equal to
(0.442) is used as a non-Newtonian fluid. Th
بحث لمعرفة رواة السنن والمسانيد للحافظ ابن نقطة
The study aimed to identify the future thinking skills of university students and which of these skills are prevalent. The sample of the study consisted of (400) male and female students from the university students. In order to achieve the goals of the research, the researcher built a measure of future thinking skills based on Torrance theory (2003). Psychometric properties of the standards were extracted, which are represented by honesty and consistency and the application of the measures to the research sample. The researchers found that Future thinking skills of university students, and that the skill of future planning is the most common skill among the research sample.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More