The research aims to assess the local accounting procedures related in one of developments that have taken place, and largely on the structure of the Iraqi economic activity. But a partnership between the (public and private sector), or one of the types of joint arrangements, and through the use of the analytical method and extrapolate the reality of the accounting treatments in Company research sample. Research found to a number of conclusions that the unified accounting system applied in the economic units that deal with contracting joint arrangements formula suffers from obvious shortcomings, and reflected the common arrangements suffer from obvious shortcomings. and reflected on the quality of financial reporting, and the urgent need
... Show MoreThe aim of this study is to identify the effect of particle size and to increase the concentration of Iraqi bentonite on rheological properties in order to evaluate its performance and to know if it can be used as drilling fluid without additives or not. In this study, Iraqi bentonite was carried out by mineral composition (XRD), chemical composition (XRF) and Particle size distribution (PSD), and its rheological properties were measured at different particle size and concentration. The results showed that when the particle size of Iraqi bentonite decreased, and the rheological properties were increased with increased concentration of Iraqi bentonite. Also, Iraqi bentonite was unable to use as drilling fluid without certain additives.
... Show MoreBackground: Most prevalent chronic liver disease in developed and developing nations is non-alcoholic fatty liver disease. From fatty liver, which often has benign, non-progressive clinical history, to non-alcoholic steatohepatitis, a more serious variant of fatty liver that can lead to cirrhosis and end-stage liver disease, non-alcoholic fatty liver disease encompasses broad spectrum of diseases. The gold standard for determining extent of hepatic fibrosis is still liver biopsy; however, number of noninvasive tests have been established to make diagnosis and assess effectiveness of treatment.
Objective: Aim of study was to assess effectiveness of the combination of fibroscan and
... Show MoreComputer simulations were carried out to investigate the dependence of the main perturbation parameters (Sun and Moon attractions, solar radiation pressure, atmosphere drag, and geopotential of Earth) on the orbital behavior of satellite. In this simulation, the Cowell method for accelerations technique was adopted, the equation of motion with perturbation was solved by 4th order Runge-Kutta method with step (1/50000) of period to obtain the state vectors for position and velocity. The results of this simulation have been compared with data that available on TLEs (NORD data in two line elements). The results of state vectors for satellites (Cartosat-2B, Gsat-14 an
The objective of this study is to evaluate the efficacy and safety of rowatinex and tamsulosin in the treatment of patients with ureteric stone.
Forty patients with ureteric stone ranged (4- 12) mm, were included in this study. They were randomized into two groups where the first group includes twenty patients treated with Rowatinex three times daily (Group 1), and the second group includes twenty patients treated with tamsulosin 0.4mg/day (Group 2). All patients were randomly assigned to receive the designed standard medical therapy for a maximum of 3 weeks.
Each group was given an antibiotic as prophylaxis and an injectable non-steroidal anti-inflammatory drug used on demand. At the outpatient clinic all subjects were a
... Show MoreThe goal of this paper is to study dynamic behavior of a sporadic model (prey-predator). All fixed points of the model are found. We set the conditions that required to investigate the local stability of all fixed points. The model is extended to an optimal control model. The Pontryagin's maximum principle is used to achieve the optimal solutions. Finally, numerical simulations have been applied to confirm the theoretical results.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreIn this paper, we introduced a mathematical model for Iraqi Airways Company about evaluating its objectives and strategies. First, we studied Iraqi Airways schedules with different departure cities for each airline path. Then, we applied some fuzzy integrals for determining the best airline path.
Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show More