The paper aims at initiating and exploring the concept of extended metric known as the Strong Altering JS-metric, a stronger version of the Altering JS-metric. The interrelation of Strong Altering JS-metric with the b-metric and dislocated metric has been analyzed and some examples have been provided. Certain theorems on fixed points for expansive self-mappings in the setting of complete Strong Altering JS-metric space have also been discussed.
The research aims to develop physical exercises with auxiliary training tools that work to develop the explosive power of the arms and legs, and then find out their effect on the accuracy of shooting from free throw and correction from jumping of advanced basketball players, as the researchers found a problem that these players have weakness in the skill of throwing Free throwing and shooting by jumping calculated with two points as a result of adopting unhealthy physical and technical positions, which led to a lack of focus and accuracy, and thus negatively affected the performance technique of free throw and jump shot, as most teams use traditional exercises without the use of auxiliary training tools, and this topic gave researchers the
... Show More
Facing industrial companies many pressures and challenges due to rapid changes in the business environment of contemporary, which requires them to do their performance look more inclusive rather than limiting performance evaluation on the financial perspective in spite of its importance, prompting companies to rethink their reality competitive through the adoption of methodologies and new philosophies to manage competitiveness of total quality management, and re-engineering of production processes, and knowledge management,... etc., as This study framework cognitive and practical "to evaluate the performance of a company Diyala General Electric Industries and how to rehabilitate
In many oil fields only the BHC logs (borehole compensated sonic tool) are available to provide interval transit time (Δtp), the reciprocal of compressional wave velocity VP.
To calculate the rock elastic or inelastic properties, to detect gas-bearing formations, the shear wave velocity VS is needed. Also VS is useful in fluid identification and matrix mineral identification.
Because of the lack of wells with shear wave velocity data, so many empirical models have been developed to predict the shear wave velocity from compressional wave velocity. Some are mathematical models others used the multiple regression method and neural network technique.
In this study a number of em
... Show MoreThe CIGS/CdS p-n junction thin films were fabricated and deposited at room temperature with rate of deposition 5, and 6 nm secG1 , on ITO glass substrates with 1mm thickness by thermal evaporation technique at high vacuum pressure 2×10G5 mbar, with area of 1 cm2 and Aluminum electrode as back contact. The thickness of absorber layer (CIGS) was 1 µm while the thickness of the window layer CdS film was 300 nm. The X-ray Diffraction results have shown that all thin films were polycrystalline with orientation of 112 and 211 for CIGS thin films and 111 for CdS films. The direct energy gaps for CIGS and CdS thin films were 1.85 and 2.4 eV, respectively. Atomic Force Microscopy measurement proves that both films CIGS and CdS films have nanostru
... Show MoreThe aim of this study was to identify the depth of the mouth and its shape in some local fish belonging to the Cyprinidae family, and the extent to which the depth of the mouth is related to the way of feeding and the nature of food as well as the feeding habits of those species collected specifically from the Tigris River, the results showed a relationship of depth oral cavity with head length was highly significant at (P < 0.01) for all studied species. Also, there was a highly significant relationship between the height of the pharyngeal tooth-bearing bone and the depth of the oral cavity for fish of this local family.
Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C
... Show MoreAlzheimer’s disease (AD) is an age-related progressive and neurodegenerative disorder, which is characterized by loss of memory and cognitive decline. It is the main cause of disability among older people. The rapid increase in the number of people living with AD and other forms of dementia due to the aging population represents a major challenge to health and social care systems worldwide. Degeneration of brain cells due to AD starts many years before the clinical manifestations become clear. Early diagnosis of AD will contribute to the development of effective treatments that could slow, stop, or prevent significant cognitive decline. Consequently, early diagnosis of AD may also be valuable in detecting patients with dementia who have n
... Show MoreBlogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.