We have studied new subclass B (A, B,γ) over multivalent functions. We have present some effects because of the category B (A, B,γ). We bear mentioned simple properties, convolution properties, incomplete sums, weighted mean, arithmetic mean, linear combination, inclusion rapport and neighborhood properties, software concerning fractional calculus then vile residences because of both the classes…
The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreThis research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squa
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreDiabetes mellitus type II is a disorder of metabolism and complex diseases affected by genetic environmental factors and associated with inflammation. The symptoms of type II diabetes develop gradually, which are associated with increased blood concentration of marker of the endothelial inflammatory factors. The expression of adhesion molecules, including E-selectin, intracellular adhesion molecule-1(ICAM-1) and vascular cell adhesion molecule-1 (VCAM-1) on the surface of vascular endothelial cells to help leukocyte stick to other surrounding tissues. Many researchers have made attempts to determine the significance of particular ABO phenotype for the susceptibility to diseases. Many reports show a strong association with the ABO blood grou
... Show MoreType 2 diabetes mellitus (DM) is a group of metabolic disorder disease. The inflammatory markers act as a new risk factor for development of type 2 diabetes with a possible association with ABO/Rh blood groups. Human ABO genes are located on chromosome 9q34.1-q34.2. The aim of this study was to investigate the possible association between inflammatory markers, interleukin (IL) -18 and IL-33 in type 2DM and ABO blood groups. Sixty four patients with newly diagnosed type2 DM and control group consist of twenty healthy Iraqi individual. Laboratory test were include ABO blood groups using standard serological procedures and detection IL-18 and IL-33 in serum by ELISA kits. The Present data showed a significant increase i
... Show MoreInflammation of the tonsils could be described as acute tonsillitis, mainly due to infection. Recurrent tonsillitis could be defined as 3-7 episodes during the first 3 years of age. Vitamin D, which is a neuro-hormone with pleiotropic biological activities may modulate the immune response by alleviation, and stimulation of Th1 and Th2 cell proliferation, respectively, that influence the stimulation, synthesis, and secretion of both pro and anti-inflammatory cytokines. In this study we aimed to shed light on the levels of vitamin D in children with different episodes of tonsillitis in association with levels of interleukins (TNFα, IL-2, IL-4, IL-10). Blood samples were collected from 48 participants in 3 groups: control, acute tonsilliti
... Show MoreAbstract:
This study aims to identify the level of patients’ satisfaction among a sample of hospitalized patients in the targeted hospital (Al-Kindy Teaching Hospital, and Al-Yarmook Teaching Hospital). Moreover, this study highlights the reality of services for patients, especially in the targeted governmental teaching hospitals. The Patient Satisfaction with Nursing Care (PSNCS) has been measured in these hospitals through the revised scale by Tang et al, (2013).This scale includes four major domains; Health Information (5 items), Influencing Support (4 items), Decision Control (4 items), Specialized Technical Competence (7 items). The method of surveying patients’ opinions about the degree
... Show MoreThis research presents a numerical study to simulate the heat transfer by forced convection as a result of fluid flow inside channel’s with one-sided semicircular sections and fully filled with porous media. The study assumes that the fluid were Laminar , Steady , Incompressible and inlet Temperature was less than Isotherm temperature of a Semicircular sections .Finite difference techniques were used to present the governing equations (Momentum, Energy and Continuity). Elliptical Grid is Generated using Poisson’s equations . The Algebraic equations were solved numerically by using (LSOR (.This research studied the effect of changing the channel shapes on fluid flow and heat transfer in two cases ,the first: cha
... Show More