.
The purpose of this paper is to find the best multiplier approximation of unbounded functions in –space by using some discrete linear positive operators. Also we will estimate the degree of the best multiplier approximation in term of modulus of continuity and the averaged modulus.
This research deals with the financial reporting for non-current assets impairment from the viewpoint of international accounting standards, particularly IAS 36 "Impairment of non-current assets." The research problems focus on the presence of internal and external indicators on impairment of non-current assets in many of companies listed in Iraqi stock exchange. So it is required to apply IAS 36 to reporting for the impairment loss of assets since this impairment impact certain financial indicators. These indicators help users in their decision-making and forecasting future financial situation and the ability of the company to achieve future profits or maintain current profits. The research aims to shedding lig
... Show MoreUniversity campuses in Iraq are substantial energy consumers, with consumption increasing significantly during periods of high temperatures, underscoring the necessity to enhance their energy performance. Energy simulation tools offer valuable insights into evaluating and improving the energy efficiency of buildings. This study focuses on simulating passive architectural design for three selected buildings at Al-Khwarizmi College of Engineering (AKCOE) to examine the effectiveness of their cooling systems. DesignBuilder software was employed, and climatic data for a year in Baghdad was collected to assess the influence of passive architectural strategies on the thermal performance of the targeted buildings. The simulations revealed that the
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreStereolithography (SLA) has become an essential photocuring 3D printing process for producing parts of complex shapes from photosensitive resin exposed to UV light. The selection of the best printing parameters for good accuracy and surface quality can be further complicated by the geometric complexity of the models. This work introduces multiobjective optimization of SLA printing of 3D dental bridges based on simple CAD objects. The effect of the best combination of a low-cost resin 3D printer’s machine parameter settings, namely normal exposure time, bottom exposure time and bottom layers for less dimensional deviation and surface roughness, was studied. A multiobjective optimization method was utilized, combining the Taguchi me
... Show MoreTwo series of 1,3,4-oxadiazole derivatives at the sixth position of the 2,4-di-
After baking the flour, azodicarbonamide, an approved food additive, can be converted into carcinogenic semicarbazide hydrochloride (SEM) and biurea in flour products. Thus, determine SEM in commercial bread products is become mandatory and need to be performed. Therefore, two accurate, precision, simple and economics colorimetric methods have been developed for the visual detection and quantitative determination of SEM in commercial flour products. The 1st method is based on the formation of a blue-coloured product with λmax at 690 nm as a result of a reaction between the SEM and potassium ferrocyanide in an acidic medium (pH 6.0). In the 2nd method, a brownish-green colored product is formed due to the reaction between the SEM and phosph
... Show MoreOne of the critical factors for dental implant success is accurate clinical and radiological assessment. Cone-beam computed tomography systems (CBCT) allow surgeons to determine the quality and quantity before surgery, aiding in treatment planning. This study highlights the importance of such an assessment Materials and Methods A total of 40 patients were referred to CBCT scanning for pre-dental implant assessment in the Oral and Maxillofacial Radiology department at Al-Shaheed Gazi Al Hariri Hospital from 2021 to 2022. The patients were between 18 and 50 years old. All data were analyzed with on-demand 3D software (Kavo OP 3D: Cone Beam 3D imaging Germany). Results: Regarding the ridge shape: In the upper anterior and posterior regions, th
... Show MoreYohimbine is actually confirmed in the United States to be utilized for erectile dysfunction; and recently such drug has become commonly used in body-building communities for its presumed lipolytic and sympathomimetic effects. But ingestion of such drug can bring about epileptic neurotoxic effects.
Many antiepileptic drugs can be utilized to counteract myoclonic seizure; furthermore, diazepam can be used to oppose such type of seizure; in addition, surrogate therapeutic options such as omega 3 may also be utilized.
In this study, twenty-four (24) mice of both sexes weighing 20-25g were randomly-allocated into 4 groups (6 animals each group) as follows: Group I-
... Show MoreObjective(s): The aims of present study to findout the effect of aeromedical evacuation program on flight medics’ knowledge.
Methods: A pre-experimental design is carried in army aviation bases in Iraq, for the period of April 1st 2019 to October 25th 2019. Non-probability "purposive" sample of (30) flight medics are selected from army aviation bases. The questionnaire consisted of two main parts: the demographic characteristics of air paramedics, and the second part included five axes, which are (50) paragraphs related to the knowledge of air paramedics towards emergency injuries. The researcher used the statistical program version 20 to analyze the data, and the stability of the questionnaire was measured through the pre and post