This paper applies the Modified Adomian Decomposition Method (MADM) for solving Integro-Differential Inequality, this method is one of effective to construct analytic approximate solutions for linear and nonlinear integro-differential inequalities without solving many integrals and transformed or discretization. Several examples are presented, the analytic results show that this method is a promising and powerful for solving these problems.
Background: Brain abscess is collection of pus in the brain parrynchima surrounded by a true capsule. Usually diagnosed by CT & MRI, & treated surgically by drainage by burr hole, or excision.
Objective: evaluate our work with brain abscess.
Patient& method: 74 Patients collected in the specialized surgical hospital neuro-surgical department, from Jan. 1995 till Jan. 2005 treated surgically, all cases fully evaluated clinically & radiologically & then evaluation of the surgical procedure.
Results: there is a slight male predominance & prevalence more in the 1st 2decades of life mostly in children with cong. heart disease, headache was the most common presenting feature, with other signs of infection diagn
Abstract
People are supposed to use language harmoniously and compatibly. However, aggression may characterize much of human communication. Aggression has long been recognized as a negative anti-social issue that prevails in most personal interactions. If it abounds in familial communications, it is more dangerous due to its harmful effects on individuals, and consequently on societies. Aggression refers to all the instances in which we try to get our way without any consideration for others. Moriarty’s novel (2014), Big Little Lies, is argued to represent the patterns of aggressive communications. This study aims to find out the motivations behind aggressive language in familial communication in this
... Show MoreFutsal and blind football are group games of a competitive nature due to their excitement, excitement, fun, and aesthetic goals with charming artistic touches. This explains the public's passion for these two games, whether healthy people or blind people play them, to expand their vision and knowledge. About these two games, a historical approach is presented about their origins, development, and how they became globally recognized competitive sports with unified rules and world championships at various levels. Studying the origin and global spread of both futsal and blind football and identifying the most prominent developments in the rules and tools for futsal and blind football. The most important findings were that both futsal and footb
... Show MoreLandSat Satellite ETM+ image have been analyzed to detect the different depths of regions inside the Tigris river in order to detect the regions that need to remove sedimentation in Baghdad in Iraq Country. The scene consisted of six bands (without the thermal band), It was captured in March ٢٠٠١. The variance in depth is determined by applying the rationing technique on the bands ٣ and ٥. GIS ٩. ١ program is used to apply the rationing technique and determined the results.
This paper describes a newly modified wind turbine ventilator that can achieve highly efficient ventilation. The new modification on the conventional wind turbine ventilator system may be achieved by adding a Savonius wind turbine above the conventional turbine to make it work more efficiently and help spinning faster. Three models of the Savonius wind turbine with 2, 3, and 4 blades' semicircular arcs are proposed to be placed above the conventional turbine of wind ventilator to build a hybrid ventilation turbine. A prototype of room model has been constructed and the hybrid turbine is placed on the head of the room roof. Performance's tests for the hybrid turbine with a different number of blades and different values o
... Show MoreSome nonlinear differential equations with fractional order are evaluated using a novel approach, the Sumudu and Adomian Decomposition Technique (STADM). To get the results of the given model, the Sumudu transformation and iterative technique are employed. The suggested method has an advantage over alternative strategies in that it does not require additional resources or calculations. This approach works well, is easy to use, and yields good results. Besides, the solution graphs are plotted using MATLAB software. Also, the true solution of the fractional Newell-Whitehead equation is shown together with the approximate solutions of STADM. The results showed our approach is a great, reliable, and easy method to deal with specific problems in
... Show MoreThe article reflects the results of the analysis of the use of metaphors as one of the main means used by Lyudmila Ulitskaya when writing the novel “Sincerely Yours Shurik” to form the image of the main hero in the novel. The main purpose of the article is to consider metaphors, which helped the author to form the image of the main character Shurik in the text space through the stages of his life path, closely related to the people around him, who is always happy to be useful (hence the title "Sincerely Yours"), among which the female images of his relatives, girlfriends and others stand out as a special layer in the narrative. And in the course of the study, the following tasks were solved: the metaphors that make up the image of the
... Show MoreRegarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra
... Show MoreSteganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re
... Show More