The paper is devoted to solve nth order linear delay integro-differential equations of convolution type (DIDE's-CT) using collocation method with the aid of B-spline functions. A new algorithm with the aid of Matlab language is derived to treat numerically three types (retarded, neutral and mixed) of nth order linear DIDE's-CT using B-spline functions and Weddle rule for calculating the required integrals for these equations. Comparison between approximated and exact results has been given in test examples with suitable graphing for every example for solving three types of linear DIDE's-CT of different orders for conciliated the accuracy of the results of the proposed method.
Objective(s): The study aims to assess the early detection of early detection of first degree relatives to type-II
diabetes mellitus throughout the diagnostic tests of Glycated Hemoglobin A1C. (HgbA1C), Oral Glucose Tolerance
Test (OGTT) and to find out the relationship between demographic data and early detection of first degree
relatives to type-II diabetes mellitus.
Methodology: A purposive "non-probability" sample of (200) subjects first degree relatives to type-II diabetes
mellitus was selected from National Center for Diabetes Mellitus/Al-Mustansria University and Specialist Center
for Diabetes Mellitus and Endocrine Diseases/Al-kindy. These related persons have presented the age of (40-70)
years old. A questio
SIFCON is characterized as a construction material of high ductility and very high strength. It is suitable for concrete structures used for special applications. However, the density of SIFCON is much higher than that of Fiber Reinforced Concrete (FRC) due to the need for a large amount of high-density steel fibers. This work examines the split tensile behavior of modified weight slurry infiltrated fiber concrete utilizing a mixture of two types of fibers, steel fiber, and polyolefin fiber. For the investigation, 30 cylinders and 15 cubes were poured. The used volume fraction (V.F) is (6 %) and the use of five series once as each type separately and once a hybrid in proportions of 2/3 polyolefin with 1/3 steel fiber and
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
A total of nine swab samples were collected from inflamed teeth and gingiva of human’soral cavity from a dentist clinic in Baghdad. All specimens were cultured in Mitis Salivarius agar medium and the isolated bacterial pure colonies werethen identified by using VITEK2. Three samples were diagnosed and identified as Staphylococcus lentus. One of the three isolates which showed a distinctive heavy growth on the media was selected for further analysis in this study. Paper disk diffusion method was used to detect the antibacterial activityof three of mouthwash solutions (Zak, Colgate and Listerine). The results showed that “Colgate†was the most active solution with antibacterial activity compared with the other two s
... Show MoreData scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for
A representative sample of a thousand volunteer university students was screened for evidence of thalassemia minor.Complete blood counts using automated blood cell analysers and blood smears were examined. Patients having anemia, abnormal red cell indices or morphological features of thalassemia minor like hypochromia, microcytosis, target cells erythrocytosis and family history of thalassemia were then investigated for determination of HbA2 & HbF levels. Estimation of hemoglobin A2 was performed by micro-column chromatography while HbF was done using alkali denaturation. Seventy seven out of the thousand samples tested positive for thalassemia minor. They all showed a hemoglobin A
This research investigates the subject of the impact of wars (as a manifestation of crisis) on architecture, and the extent of continuing wars physical and moral results of wars, even after the end of the cause of the crisis. The impact of different rebuilding which exposed to the effects of the war seems different in crisis regions.
The problem of research is about the uncertainty of the impact of the way chooses for reconstructing the buildings after wars in the continuity of the crisis of war. The goals of this research are to clarify the influence of methods of reconstruction of buildings in a city chosen which is Beirut, on the continuation of the war crisis with the argument of demolishing and rebuilding newly or keeping tr
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreThe main object of this article is to study and introduce a subclass of meromorphic univalent functions with fixed second positive defined by q-differed operator. Coefficient bounds, distortion and Growth theorems, and various are the obtained results.