In this paper, a general fixed point theorem for cyclic multi-valued mappings satisfying an implicit relation from  different from implicit relations used in  and , generalizing some results from , , , , ,  and from other papers, is proved.
A general fixed point theorem for two pairs of absorbing mappings satisfying a new type of implicit relation (), without weak compatibility in Gp-metric spaces is proved. As applications, new results for mappings satisfying contractive conditions of integral type and for ϕ-contractive mappings are obtained.
The purpose of this paper is to prove a general fixed point theorem for mappings involving almost altering distances and satisfying a new type of common limit range property in Gpmetric spaces. In the last part of the paper, some fixed point results for mappings satisfying contractive conditions of integral type and for ⱷ-contractive mappings are obtained.
New potentially biologically active compounds derived from 2-mercapto-benzoxazole were synthesized and coupled on polymeric support of poly (maleic anhydride-alt-vinyl acetate) for the preparation of polymer-drug conjugates with controlled drug release. All compounds were characterized by elemental and spectroscopy (FT-IR, 1H-NMR) analysis. The toxicological tests recommend the products for further laboratory screening.
The purpose of this paper is to introduce a new type of φ -implicit relation in S - metric spaces and to prove a general fixed point for a pair of weakly compatible mappings, which generalize Theorems 1, 2, 4 , Theorems 1-7 , Corollary 2.19 , Theorems 2.2, 2.4 , Theorems 3.2, 3.3, 3.4  and other known results.
In this paper a general fixed point theorem for mappings with a new type of common limit range property satisfying a mixed implicit relation is proved. In the last part of the paper, as application, some fixed point results for mappings satisfying contractive conditions of integral type and for φ-contractive mappings are obtained.
The purpose of this paper is to prove a general theorem of Meir - Keeler type using the notion of altering distance for occasionally weakly compatible mappings satisfying an implicit relation. As application, a problem of Meir - Keeler type satisfying a condition of integral type becomes a special case of a problem of Meir - Keeler type with an altering distance.
This article analyzes and highlights the security perspective of Internet of Things (IoT) connected devices and their communication challenges, as IoT is considered one of the key emerging fields in Industry 4.0. The IoT architectures can consist of physical systems, virtual ones or even hybrids, combining a collection of different physically active things, sensors, cloud services, specific IoT protocols, communication layers, users and developers. On top of all, it is the business layer, because the scope of the entire IoT environment is to deliver data, to monitor and to facilitate the management of complex processes. In order to facilitate the data exchange between the IoT layers, there have been developed a series of protocols particular to the IoT domain. As in many IT related fields, the solutions are not perfect from the data security and privacy perspectives, many challenges being still open research issues. As the two concepts of IoT and Cloud of Things are connected, bringing real world data into the Cloud to process it, raises Cloud Computing security concerns regarding the privacy and security of data. Although in recent years, many efforts have been made to improve Cloud Computing security, there are risks that need to be taken into consideration. From the Web of Data’s point of view, things are even more prone to security risks. Because privacy is one of the fundamental right of digital users, it is extremely important for new technologies to comply with privacy regulations and policies, such as the new European data protection and privacy frameworks. In this context, companies must take into account standards, challenges and new trends in IoT. In the absence of specific measures, raw or processed data can be easily stolen from the Web of Data. In this paper we analyze and present the main protocols of communication in the IoT field from a data security perspective. Also, we do a review of the main architectures that can improve the security of the communication between IoT devices and the Cloud data storage.