In this research we have been studied the 3rd order spherical aberration for an optical system consisted of obscured circular aperture with non central circular obscuration through the calculation of point spread function (P.S.F) in presence of the obscuration in the center and comparing the obtained results with that results of moving obscuration far away from the center, where the results showed significant improvement for(P.S.F) value. The study was done of different obscurities ratios in addition to the different 3rd order spherical aberration values (W40=0.25 ,0.5 ,0.75 ,1 ).
BACKGROUND: Clavicle fractures are common injuries in young active individuals, the mid third of the clavicle is most commonly fractured part(80% of clavicle fracture) OBJECTIVE: To compare the outcomes of operative and non operative management of displaced and or comminuted closed fracture of the mid third of clavicle in young adults PATIENTS AND METHODS: This prospective observational study of 24 patients of fracture of the mid third of the clavicle was conducted in Alkindy teaching hospital from July 2015 to January 2017 and divided into two groups; one managed by operative treatment with plate and screws and the other by non operative sling immobilization after taking the consent and the patients were seen at 2, 4, 6 weeks,3, 6, and 9 m
... Show MoreThe Quantitative high-resolution planktonic foraminiferal analysis of the subsurface section in three selected wells in the Ajeel Oil Field (Aj-8, Aj-12, and Aj-15) in Tikrit Governorate, Central Iraq has revealed that Shiranish Formation deposited in Late Campanian- Latest Maastrichtian age. This formation consists mainly of marly and marly limestone yielding diverse planktonic foraminiferal assemblages and calcareous benthic foraminifera, with a total of 46 species that belong to 23 genera, Three zones and four subzones, which cover the Late Campanian to the Latest Maastrichtian, were identified based on the recorded planktonic foraminifera and their ranges. They are as follows:1. Globotruncana aegyptiaca Zone that dated to be Lat
... Show MoreThe one-dimensional, spherical coordinate, non-linear partial differential equation of transient heat conduction through a hollow spherical thermal insulation material of a thermal conductivity temperature dependent property proposed by an available empirical function is solved analytically using Kirchhoff’s transformation. It is assumed that this insulating material is initially at a uniform temperature. Then, it is suddenly subjected at its inner radius with a step change in temperature. Four thermal insulation materials were selected. An identical analytical solution was achieved when comparing the results of temperature distribution with available analytical solution for the same four case studies that assume a constant thermal con
... Show MoreAn experiment was conducted to study how SAE 50 engine oil contaminated with diesel fuel affects engine performance. The engine oil was contaminated with diesel fuel at concentrations of 0%, 1%, and 3%. The following performance characteristics were studied: brake-specific fuel consumption, brake thermal efficiency, friction power, and exhaust gas temperature. Each treatment was tested three times. The three treatments (0%, 1%, and 3%) were analyzed statistically with a one-way ANOVA model at the 5% probability level to determine if the three treatments produced significant differences in engine performance. The statistical results showed that there were significant differences in engine performance metrics among the three treatments. The 3
... Show MoreBackground: Odontogenisis is a complex process controlled by dynamic and reciprocal interactions that regulated by various molecules. Thymosin β4 is a small bioactive peptide with wide spectrum biological effects on much cell types. The present study was designed to highlight the effect of synthetic exogenous Tβ4 on developing dental tissue of the upper central teeth of rats, by histological examination and immunohistochemical evaluation of TGFβ1. Materials and method: Thirty six Albino Wister pregnant rat 18control group received intraperitoneal injection of normal saline and the others are experimental group received 50µg/300µl of Tβ4 injection. The animals were sacrificed at periods 16th and 18th day I.U.L and one day p
... Show MoreThe issue of the Circular Economy is not a new issue to several countries, especially the developed ones. Here in Iraq it is considered newly introduced, despite the few attempts to establish projects that concern recycling most of them were doomed to fail, due to two main reasons: the first one is the financial and administrative corruption widespread in all departments of the country, the second one is the priorities of public spending. It is well known that Iraq was subjected to two major attacks, the ISIS entry attack in 2014 to Iraq. ISIS occupied about a third of Iraqi lands which resulted in a collapse in oil prices, as Iraq depends almost entirely on oil revenues in its budget which is the second attack. This made the Iraqi governme
... Show MoreThe aim of this study was to evaluate the risk factors that influence the perforation, regardless of the presence of H. pylori infection, in a sample of Iraqi patients with peptic ulcers, admitted to Al-Kindy Teaching Hospital. A total of 90 patients who had perforated peptic ulcer participated in this study. The diagnosis was based on history, clinical examination, laboratory and radiological investigations and was confirmed intraoperatively. A number of probable risk factors for perforation were investigated. Eighty participants were males and 10 were females (male to female ratio 8:1). About 42.2% of patients were in their fifth decade of life. Forty-nine (54.4%) patients were asymptomatic be
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show More