The aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.
This paper deals with the Magnetohydrodynyamic (Mill)) flow for a viscoclastic fluid of the generalized Oldroyd-B model. The fractional calculus approach is used to establish the constitutive relationship of the non-Newtonian fluid model. Exact analytic solutions for the velocity and shear stress fields in terms of the Fox H-function are obtained by using discrete Laplace transform. The effect of different parameter that controlled the motion and shear stress equations are studied through plotting using the MATHEMATICA-8 software.
Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreThe report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show MoreEach project management system aims to complete the project within its identified objectives: budget, time, and quality. It is achieving the project within the defined deadline that required careful scheduling, that be attained early. Due to the nature of unique repetitive construction projects, time contingency and project uncertainty are necessary for accurate scheduling. It should be integrated and flexible to accommodate the changes without adversely affecting the construction project’s total completion time. Repetitive planning and scheduling methods are more effective and essential. However, they need continuous development because of the evolution of execution methods, essent
This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreNonmissile penetrating spine injury (NMPSI) represents a small percent of spinal cord injuries (SCIs), estimated at 0.8% in Western countries. Regarding the causes, an NMPSI injury caused by a screwdriver is rare. This study reports a case of a retained double-headed screwdriver in a 37-year-old man who sustained a stab injury to the back of the neck, leaving the patient with a C4 Brown-Sequard syndrome (BSS). We discuss the intricacies of the surgical management of such cases with a literature review.
PubMed database was searched by the following combined formula of medical subjects headings,
Continuous functions are novel concepts in topology. Many topologists contributed to the theory of continuous functions in topology. The present authors continued the study on continuous functions by utilizing the concept of gpα-closed sets in topology and introduced the concepts of weakly, subweakly and almost continuous functions. Further, the properties of these functions are established.