We define L-contraction mapping in the setting of D-metric spaces analogous to L-contraction mappings [1] in complete metric spaces. Also, give a definition for general D- matric spaces.And then prove the existence of fixed point for more general class of mappings in generalized D-metric spaces.
on the subject of the provisions of recitation among students of the Islamic Sciences Colleges).
The researchers adopted the experimental method and chose an experimental design for the two equivalent groups by post-test. The research sample consisted of (60) male and female students from (second stage) - Department of Qur’an Sciences and Islamic Education - University of Diyala, and the two researchers were rewarded between the two groups of research in the following variables: (Chronological age calculated in months, degrees of recitation rulings subject in the previous year, the two researchers studied the same research groups, and lasted for an entire semester, the researchers prepared the observation card to measure the ru
... Show MoreThe high cost of chemical analysis of water has necessitated various researches into finding alternative method of determining portable water quality. This paper is aimed at modelling the turbidity value as a water quality parameter. Mathematical models for turbidity removal were developed based on the relationships between water turbidity and other water criteria. Results showed that the turbidity of water is the cumulative effect of the individual parameters/factors affecting the system. A model equation for the evaluation and prediction of a clarifier’s performance was developed:
Model: T = T0(-1.36729 + 0.037101∙10λpH + 0.048928t + 0.00741387∙alk)
The developed model will aid the predictiv
... Show MoreThe aim of this paper is to design artificial neural network as an alternative accurate tool to estimate concentration of Cadmium in contaminated soils for any depth and time. First, fifty soil samples were harvested from a phytoremediated contaminated site located in Qanat Aljaeesh in Baghdad city in Iraq. Second, a series of measurements were performed on the soil samples. The inputs are the soil depth, the time, and the soil parameters but the output is the concentration of Cu in the soil for depth x and time t. Third, design an ANN and its performance was evaluated using a test data set and then applied to estimate the concentration of Cadmium. The performance of the ANN technique was compared with the traditional laboratory inspecting
... Show MoreAbstract
Public debt has posed a major challenge to both developing and developed countries, which has focused attention on the optimal limits (threshold of debt) and its determinants.
The study examines the effect of the Public bank debt on the foreign reserves and the work of the foreign reserve as a limitation on the process of bank debt (part of the internal debt) for the period (2017-2004), in addition to finding the type and nature of the relationship between them according to the hypotheses of the study, Public bank debt and foreign reserves.
The study was based on data from the Iraqi banking sector, which showed that Iraq has a foreign reserve in line with internat
... Show MoreThe pillars of sustainable development are representing the interface between environmental, economic, and social sustainability. Sustainable development is a method of planning and managing construction projects to reduce the effect of the construction process on the environment so that there is a balance between environmental capabilities and the human needs of present and future generations. Usually, Environmental sustainability is most important and effective in construction projects. The environment suffers from significant negative impacts as a result of the implementation of construction projects; therefore, this study aims to identify the effecting factors on environmentally sustainable development. The methodology of this s
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreThis study was conducted with the aim to extract and purify a polyphenolic compound “ Resveratrol†from the skin of black grapes Vitis vinifera cultivated in Iraq. The purified resveratrol is obtained after ethanolic extraction with 80% v/v solution for fresh grape skin, followed by acid hydrolysis with 10% HCl solution then the aglycon moiety was taken with organic solvent
( chloroform). Using silica gel G60 packed glass column chromatography with mobile phase benzene: methanol: acetic acid 20:4:1 a
... Show More