Let M be a n-dimensional manifold. A C1- map f : M M is called transversal if for all m N the graph of fm intersect transversally the diagonal of MM at each point (x,x) such that x is fixed point of fm. We study the minimal set of periods of f(M per (f)), where M has the same homology of the complex projective space and the real projective space. For maps of degree one we study the more general case of (M per (f)) for the class of continuous self-maps, where M has the same homology of the n-dimensional sphere.
Praise be to God, Lord of the worlds, and prayers and peace be upon the most honorable of God’s creation, Muhammad bin Abdullah, the illiterate Arab prophet, the faithful, and his family and companions.
And yet ...
The realistic view is that Islamic jurisprudence is not exaggerated in the judgment of compensation, so it is judged for everything that has been lost by the victim of a profit or his loss, but he takes into account the bearing of the guarantee between profit and loss or the principle on which the theory of bearing liability is found, and it is clear through research that Islam The principle of respecting money, souls and rights is considered a public order, but it may exclude some ca
... Show MoreThe combination of high protein content and a soft seed coat makes the wheat-rye hybrid Triticale (Triticosecale) vulnerable to attack by rice weevils. Drying triticale grain to moisture contents safe for storage can prevent infestation by rice weevils, but if grain is being stored for seed, high drying temperatures can affect seed germination. Grain can be effectively dried at low temperatures, but low-temperature drying is difficult in hot, humid regions such as the Gulf Coast. This study nvestigated the effects of drying temperatures from 35°C to 45°C on triticale seed germination and found no statistical differences between the germination rates of the seed at any of the drying temperatures and the germination rates of controls. Final
... Show MoreHuman interferon as is the case in all kinds of interferon has complex effects but all share their impact on preventing the proliferation of viruses and preventing or reducing human Alantervjørn conversion occurs if the cell is in preventing the growth of the virus when interferon Balnmstqubl connects
Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreThe research aims to measure the accounting conservatism practice of listed companies in the Iraq stock exchange using Basu model to measure the degree of accounting conservatism in a sample of companies of (21) companies for the period from 2007 to 2011, the researcher found that most of the listed companies in the market exercised accounting conservatism when measurement and disclosure of the result of the activity and financial position and there is a variation in the degree of accounting conservatism between economic sectors , which included banking , investment , insurance , industry , agriculture , tourism and hotels.
Because the practice of accounting conservatism properly
... Show MorePharmaceutical-instigated pollution is a major concern, especially in relation to aquatic environments and drugs such as meropenem antibiotics. Adsorbents, such as multi-walled carbon nanotubes, offer potential as means of removing polluting meropenem antibiotics and other similar compounds from water. In order to evaluate the effectiveness of multi-walled carbon nanotubes in this capacity, various experimental parameters, including contact time, initial concentration, pH, temperature and the dose of adsorbent have been investigated. The Langmuir and the Freundlich isotherm models have been used. The data obtained using a modified Langmuir model have been consistent with the experimental ones; the best pH value has been obtained to have the
... Show MoreField experiment was conducted by using two fertilization systems (i.e.) biofertilizers (inoculation with Pseudomonas putida and with Azotobacter chroococcum and non - inoculation) and chemical fertilization (100%, 50% and 25% of recommended by Ministry of Agriculture) to study the influence of these system and interaction on water and grain yield productivity, some growth phytohorones and number of bacterial cells in soil rizosphere of root of wheat crop under water scarcity. The result showed that the integrate fertilization (inoculation with Pseudomonas putida and Azotobacter chroococcum bacterial + 50% of the recommended chemical fertilizer) recorded 5.70 and 5.55 t ha-1, respectively with reducing the chemical fertilizer app
... Show MoreVarious speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More