The group for the multiplication of closets is the set G|N of all closets of N in G, if G is a group and N is a normal subgroup of G. The term “G by N factor group” describes this set. In the quotient group G|N, N is the identity element. In this paper, we procure K(SL(2,125)) and K(SL(2,3125)) from the character table of rational representations for each group.
Forty – two elderly hypothyroidism patients and forty – two apparently healthy as control groups , divided to (21) male (M) and (21) female (F) also (21) control male C(M) and (21) control female C(F) aged > 60 years, were tested for the presence of thyroid peroxidase autoantibody (TPo – Ab) and thyroglobulin auto antibody (Tg – Ab) , also for Se and Zn levels in their sera . The results revealed a significant increase in (TPO – Ab) and (Tg – Ab) for group (M) and (F) compared to control group , also a siginificant increase in TPo – Ab and Tg – Ab for (F) compared to (M) was found. A significant decrease in Se and Zn level for (M) and (F) compared to control group, while no significant difference between (M) and (F). In conc
... Show MoreThis research investigates the adsorption isotherm and adsorption kinetics of nitrogen from air using packed bed of Li-LSX zeolite to get medical oxygen. Experiments were carried out to estimate the produced oxygen purity under different operating conditions: input pressure of 0.5 – 2.5 bar, feed flow rate of air of 2 – 10 L.min-1 and packing height of 9-16 cm. The adsorption isotherm was studied at the best conditions of input pressure of 2.5 bar, the height of packing 16 cm, and flow rate 6 Lmin-1 at ambient temperature, at these conditions the highest purity of oxygen by this system 73.15 vol % of outlet gas was produced. Langmuir isotherm was the best models representing the experimental data., and the m
... Show MoreAbstract Objective: To identify correlation of elevated LDH & CRP levels with the outcomes of COVID-19. Methodology: The cross-sectional retrospective study consisted of 200 COVID-19 patients who presented at a private clinical in Baghdad, Iraq. It was carried out from February 2021 to February 2022. Data included age, gender and clinical presentation. Blood samples were taken for high sensitivity CRP and LDH in the serum. Results: Out of 200 patients, 50 were critical and 150 severe according to clinical features. LDH and CRP showed a significant increase (p=0.000) in critical patients. This group involved admission to the respiratory intensive care unit requiring mechanical ventilation than in patients with severe COVID-19 (760.5±6.3 vs.
... Show MoreThe estimation of the initial oil in place is a crucial topic in the period of exploration, appraisal, and development of the reservoir. In the current work, two conventional methods were used to determine the Initial Oil in Place. These two methods are a volumetric method and a reservoir simulation method. Moreover, each method requires a type of data whereet al the volumetric method depends on geological, core, well log and petrophysical properties data while the reservoir simulation method also needs capillary pressure versus water saturation, fluid production and static pressure data for all active wells at the Mishrif reservoir. The petrophysical properties for the studied reservoir is calculated using neural network technique
... Show MoreHerein, the interfacial polymerization method has been used for the synthesis of PPy/NaVO3 composites with different compositions of NaVO3 (10 %, 20 %, 30 %, 40 % and 50 %) as an efficient electrode material for supercapacitors. The successful formation and composition of the as-prepared composites (PV1-PV5) were confirmed by FTIR, XRD, EDX, and SEM analysis. The electrochemical properties were investigated by cyclic voltammetry (CV), galvanometric charge–discharge measurement (GCD), and electrochemical impedance spectroscopy (EIS) in 0.5 M H2SO4 electrolyte. As compared to other, the PV4 composite exhibit excellent specific capacitance of 391 F g−1 at a current density of 0.75 A/g with good cycling stability of ∼59 % after 1000 cycle
... Show MoreThe problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.
Generally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the
... Show MoreThe Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show More