In 2010, Long and Zeng introduced a new generalization of the Bernstein polynomials that depends on a parameter and called -Bernstein polynomials. After that, in 2018, Lain and Zhou studied the uniform convergence for these -polynomials and obtained a Voronovaskaja-type asymptotic formula in ordinary approximation. This paper studies the convergence theorem and gives two Voronovaskaja-type asymptotic formulas of the sequence of -Bernstein polynomials in both ordinary and simultaneous approximations. For this purpose, we discuss the possibility of finding the recurrence relations of the -th order moment for these polynomials and evaluate the values of -Bernstein for the functions , is a non-negative integer
In this work, new Schiff bases of quinazolinone derivatives (Q1-Q5) were synthesized from methyl anthranilate. The synthesis involved three steps. In the first step, methyl anthranilate was reacted with isothiocyanatobenzene, producing the thiourea derivative K1. The second step entailed reacting K1 with hydrazine hydrate, synthesizing 3-amino-2-(phenylamino) quinazolin-4(3H)-one (K2). The third step involved reaction of K2 with various aromatic aldehydes, yielding the Schiff bases derivatives Q1-Q5. The chemical structures of these compounds were identified by FT-IR,1H NMR and 13C NMR spectroscopy. The newly synthesized derivatives (Q1-Q5) were subjected to rigorous evaluation to assess their efficacy as corrosion inhibitors for ca
... Show MoreIt has been revealed previously that chronic liver disease (CLD) may be associated to hormonal fluctuations. The current study, therefore, aimed to evaluate some hormones in CLD patients compared with non-CLD individuals. This case control study was conducted at Gastroenterology and Hepatology Teaching Hospital, Medical city, Baghdad, Iraq during December 2021 to May 2022. One hundred and twenty male patients with CLD (age:14-75 years) and 120 control males (age: 24-70 years) were involved in this study. Serum samples were taken from all individuals and were then analysed for many tests which included hormones (Cortisol, testosterone, prolactin, insulin and thyroid stimulating hormone TSH); biochemical analysis (Prothrombin time
... Show MoreThis study includes adding chemicals to gypseous soil to improve its collapse characteristics. The collapse behavior of gypseous soil brought from the north of Iraq (Salah El-Deen governorate) with a gypsum content of 59% was investigated using five types of additions (cement dust, powder sodium meta-silicate, powder activated carbon, sodium silicate solution, and granular activated carbon). The soil was mixed by weight with cement dust (10, 20, and 30%), powder sodium meta-silicate (6%), powder activated carbon (10%), sodium silicate solution (3, 6, and 9%), and granular activated carbon (5, 10, and 15%). The collapse potential is reduced by 86, 71, 43, 37, and 35% when 30% cement dust, 6% powder sodium meta-silicate, 10% powder activated
... Show MoreThis study is a numerical analysis of the transition process from the second to the third mode in transformer oil. In this study, it was determined how to change from the second to the third mode, which is thought to be a precursor to the process of electrical breakdown, which results in a significant loss of electrical energy and harm to electrical devices and equipment. The initiation time, length, rate of propagation velocity, and radius of the streamer discharge were determined. The transition from the second to the third mode during the electrical discharge process may lead to the occurrence of an electrical breakdown, which is one of the greatest challenges facing scientists and engineers who deal with the
... Show MoreSince the end of World War II, the United States of America began to look at the Gulf States and Iraq due to the possession of huge quantities of oil, after taking the American oil depletion in order to tighten control over the oil of these countries, has pursued various means, political and military, in the framework of its strategy So that it could achieve this control, which focused on control of production and prices, for the conviction that those who control oil impose control over the political decision of the countries of the world.
Six transition metal complexes of Cr (III), Mn(II), Co(II), Ni(II), Cu(II), and Zn(II) were prepared using 1,2-bis -(4-Amino-2,3-dimethyl-1- phenyl-pyrazolinyl)-diimino ethane(L) as ligand. These complexes were characterized by elemental analysis, magnetic susceptibility, UV/VIS and FT-IR spectroscopy. These data showed that the solid complexes of Mn(II), Co(II), Zn(II) were tetrahedral geometry, and Cr(III) was octahedral while the symmetry around Ni(II) and Cu(II) ions with the new ligand were square planar of the formula [ML]Cl2 , M=Ni(II) and Cu(II).
A simple method for the determina
... Show MoreThe impact of the auditor's personal judgment starts from the beginning of the audit process to the formation of the final opinion and the issuance of the report, and because of the possibility of bias in the auditor's judgment for various reasons that may relate to the auditor himself or the circumstances surrounding it, which requires assessing the current reality of the auditor's personal judgments In the local environment and determining their determinations. To clarify the concept and determinants of the auditor's personal judgments when implementing the audit work, prepare the report and determine the role of the international auditing standards in rationalizing the auditor's personal judgment when conducti
... Show MoreSteganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.