In this paper, some relations between the flows and the Enveloping Semi-group were studied. It allows to associate some properties on the topological compactification to any pointed flows. These relations enable us to study a number of the properties of the principles of flows corresponding with using algebric properties. Also in this paper proofs to some theorems of these relations are given.
The objective of this paper is to study the stability of SIS epidemic model involving treatment. Two types of such eco-epidemiological models are introduced and analyzed. Boundedness of the system is established. The local and global dynamical behaviors are performed. The conditions of persistence of the models are derived.
Countries have faced the challenges of high levels of public debt and seek to define the optimum limits to reduce risks to which the financial system can be exposed and its impact on the economy as a whole. Hence the importance of research in studying the impact of internal and external public debt components on indicators of stability of the financial system for the period 2005-2017 for the purpose of knowing the extent of the financial stability indicators response to the high level of the public debt from its optimum ratio, as the aim of the research is to estimate and analyze the dynamic relationship of short and long term between the components of public debt and indicators of financial stability using the (ARDL) model that
... Show MoreThe aim of this work is to study the factors that affect the welding joint of dissimilar metals. Austenitic stainless steel-type AISI (316L) with a thickness of (2mm) was welded to carbon steel (1mm) using an MIG spot welding. The filler metal is a welding wire of the type E80S-G (according to AWS) is used with (1.2mm) diameter and CO2 is used as shielding gas with flow rate (7L/min) for all times was used in this work.
The results indicate that the increase of the welding current tends to increase the size of spot weld, and also increases the sheer force. Whereas the sheer force increased inversely with the time of welding. Furthermore, the results indicate that i
... Show MoreThe dried fruit peel of pomegranate in Punicaceae family was fractionated chromatographically on Sephadex-LH-20 column .Gallic acid (trihydroxybenzoic acid) and its related galloyl esters such as gallotannin(i.e. β-penta-O-galloyl–D-glucose) were obtained homogenously. Different concentrations of gallic acid and gallotannin were used to determine their inhibitory effect on human serum cholinesterase. The enzyme activity was measured according to the method reported by the WHO .The inhibitory effect of these compounds on the activity of human serum cholinesterase have been studied in vitro .The inhibitory effect was remarkably clear with increasing concentration of gallic acid .Whereas galloyl ester showed n
... Show MoreBackground: Levetiracetam is a member of the new antiepileptic drugs and has a broad spectrum effect, used as an adjunctive therapy in addition to monotherapy in the treatment of partial onset-seizures. The effect of levetiracetam on the development of embryo nervous system after maternal exposure during pregnancy has not been identified. Objective: to evaluate the effect of antiepileptic drug, levetiracetam (LEV) within its therapeutic dose 350mg/Kg body weight on albino female rat to clarify its effect on the developing cerebral cortex histologically. Material And Methods: Ten pregnant female rats were separated into two groups, control group and experimental group. They were obtained from the animal house of the high institute of inferti
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThis book presents the problem of tooth decay due to bacteria Streptococcus mutans one of methods of treatment using 3 extracts of S. persica (miswak) (aqueous, acetone and methanol) and prove its effectiveness and its impact on the gtf (B, C, and D) genes that code the glucosyltransferase (Gtf) enzymes that cause decay membrane compared to the usual means used for the prevention of tooth decay