Background. Body mass index (BMI) is a person's weight in kilograms (or pounds) divided by the square of height in meters (or feet). Obesity affects a wide spectrum of age groups, from the young to the elderly, and there are several eye diseases related to obesity like diabetic retinopathy, floppy eyelid syndrome, retinal vein occlusion, stroke-related vision loss, age-related macular degeneration, and possibly, refractive errors. Refractive errors (RE) are optical imperfections related to the focusing ability of the eye and are the main cause of visual impairment which may result in missed education and employment opportunities, lower productivity and impaired quality of life. Aim. The study aimed to find an association between bod
... Show MoreIn this paper, we investigate and characterize the effects of multi-channel and rendezvous protocols on the connectivity of dynamic spectrum access networks using percolation theory. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from a phenomenon which we define as channel abundance. To cope with the existence of multi-channel, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocols, it becomes difficult for two nodes to agree on a common channel, thereby, potentially remaining invisible to each other. We model this in
... Show MoreA complex number is called an extended eigenvalue for an operator on a Hilbert space H if there exists a nonzero operator such that: such is called an extended eigenoperator corresponding to. The goal of this paper is to calculate extended eigenvalues and extended eigenoperators for the weighted unilateral (Forward and Backward) shift operators. We also find an extended eigenvalues for weighted bilateral shift operator. Moreover, the closedness of extended eigenvalues for the weighted unilateral (Forward and Backward) shift operators under multiplication is proven.
Contrary to deconstruction and its destructive pursuit, the concept of undermining the familiar seeks to refute the constants and its known limitations. It is done through the process of receiving and what is imposed by the formation of the word or text or the structural and design structure in general, along with the Arabic calligraphy in particular. This is based on the recipient's understanding and interpretation of the dual phenomenon and the content's manifestation. More accurately, the disclosure of its reality through its expressive phenomenology; for that sake, the research was devoted to studying “undermining the familiar and embodiment content in Arabic calligraphy” including four chapters. The first chapter comprised
... Show MoreCharge multipole Coulomb scattering form factors in 48Ca nucleus have been reproduced utilizing the theory of nuclear shell. The efficient two-body nuclear potential fpbm is considered to construct the-spin orbit term LS vectors with Harmonic Oscillator HO potential as a wave function of single particle in Fp shell. Discarded spaces ( core + higher configuration) are taken into account through the Core polarization effect by model space with accurate two-body potential of Gogny to interact the LS operating particles with the discarded space pair ( particle-hole) with energy of excitation equal to 2ћω. Gogny interaction has been selected as it had succeeded in nuclear shell theory. The computed results were compared with th
... Show More
1Center of Urban and Regional Planning, University of Baghdad, Iraq.
2Faculty of Computer Science and Mathematics, University of Kufa, Najaf, Iraq.
E-Mails: 1kareem.h@iurp.uobaghdad.edu.iq ,dr.amerkinani@iurp.uobaghdad.edu.iq , 2ahmedj.aljanaby@uokufa.edu.iq
This paper presents the results of investigating the vibrational characteristics of oblate dish with and without framed structure . A finite element method, was applied to the dynamic analysis of oblate spheroidal shell. Different types of elements were considered in one dimension and two dimensions. It was found that the natural frequencies of oblate shells had two types of behavior against increasing the shell thickness and eccentricity, which are the membrane mode and bending mode –Since – the membrane modes natural frequencies tend to increase with the increasing the eccentricity of oblate, while the bending modes natural frequencies decrease with the increasing the eccentricity till reach the optimum eccentricity.
... Show More
After the persistence of the British policy of oppression and control over the American colonies and the attempts to obliterate the identity of their inhabitants, the colonies worked on moving forward towards achieving independence, and Virginia was the first to initiate the development of the new government frameworks, through George Mason in drafting the Virginia Bill of Rights in 1776, which expressed the philosophy of the era Enlightenment and independent revolutionary thought, which called for equality and natural rights for individuals and the need for a free popular government that works for the common good.
Background: Cholecystectomy in cirrhotic patients is commonly followed by high morbidity and mortality, the incidence of hepatic cirrhosis has increased since last decade as well as the occurrence of complication such as liver failure, portal hypertension, and biliary disorders.
Patients and methods: laparoscopic Cholecystectomy was performed in 24 cirrhotic patients (18 child A and 6 child B) in an effort to obtain lower complications and mortality rates. The mean age of the group was 51.8 years, ten of the 24 patients were men and 14 female.
Results: intraoperative complications such as bleeding, dense adhesion and long operative time were recorded.
Conclusion: laparoscopic Cholecystectomy was safe and
As a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software across numerous fields and communities may now be processed through value chain networks. Despite the integration of all data networks, computing models, and distributed software that provides a broader cloud computing solution, the security solution is missing or inadequate, and more work is required to strengthen security requirements such as mutual entity trustworthiness, access controls, identity management, and data protection, all aspects of detecting and preventing attacks or threats. In order to combat cybersecurity threats, various international organizatio
... Show More