This paper aims to prove an existence theorem for Voltera-type equation in a generalized G- metric space, called the -metric space, where the fixed-point theorem in - metric space is discussed and its application. First, a new contraction of Hardy-Rogess type is presented and also then fixed point theorem is established for these contractions in the setup of -metric spaces. As application, an existence result for Voltera integral equation is obtained.
Background: Multiple sclerosis (MS) is an inflammatory disease of the central nervous system, in which the myelin sheaths got injured. The prevalence of MS is on grow, as well as, it affects the young ages. Females are most common to have MS compared to males. Oxidative stress is the situation of imbalance between oxidants (free radicals and reactive oxygen species (ROS)) and antioxidants in a living system, in which either the oxidants are elevated or antioxidants are reduced, or sometimes both. ROS and oxidative stress have been implicated in the progression of many degenerative diseases, which is important in cracking the unrevealed mysteries of MS. In this review article, some of the proposed mechanisms that link oxidative stres
... Show MoreStudies were conducted from 1980 to 1989 to determine the insect pests infested animal museum collections in Iraq. Twelve species of Coleoptera were recovered, eleven belonged to the Dermestidae, and one to the Tenebrionidae. Of these Anthrenus coloratus Reitt. and Phradonoma nobile (Reitt.) were the most commonest and widely distributed species. Trogoderma bactrianum Zhant. and Orphilus niger (Rossi) were recorded here for the first time in Iraq.
In the current review, an updated list of dark beetle species (Coleoptera, Tenebrionidae) recorded in Iraq was given. The current paper is based on previous studies in the literature and contains all dark beetles referred to in Iraq, except for the species within the Pimelinae subfamily. The investigation of this review showed the presence of 89 species belonging to 34 genera within five subfamilies. This work included mentioning the basionyms and synonyms for genera and species with their global distribution, as well as, correcting the scientific names that were mentioned in the previous checklists.
Aim: The purpose of this study was to analyze the patterns of facial fractures in children and to compare them between preschool- and school-aged children. Materials and methods: This retrospective observational study included 57 children with facial fractures. The variables analyzed were the age of the patients—divided into a preschool-aged group (0–5 years) and a school-aged group (6–12 years)—gender, cause of trauma, the facial bones involved, the pattern of fracture, the modality of treatment used, the time between injury and treatment, and the postoperative complications. Results: The incidence of facial fractures in children ≤12 years was 30.2%. The patients consisted of 40 (70.2%) males and 17 (29.8%) females, and most pati
... Show MoreFracture pressure gradient prediction is complementary in well design and it is must be considered in selecting the safe mud weight, cement design, and determine the optimal casing seat to minimize the common drilling problems. The exact fracture pressure gradient value obtained from tests on the well while drilling such as leak-off test, formation integrity test, cement squeeze ... etc.; however, to minimize the total cost of drilling, there are several methods could be used to calculate fracture pressure gradient classified into two groups: the first one depend on Poisson’s ratio of the rocks and the second is fully empirical methods. In this research, the methods selected are Huubert and willis, Cesaroni I, Cesaroni II,
... Show MoreThe manufacturing industry in Iraq has faced, during the time stages, several obstacles that have had devastating effects on the Iraqi economy. These obstacles are represented by political events and wars that have led to the depletion of most human and material resources and the suspension of most vital industrial facilities from working, And the occurrence of this major deviation in the process of economic development, For the same reasons, the contributions of the manufacturing sector to the gross domestic product varied fluctuatingly, indicating instability in the growth rates of this sector, On the other hand, the supremacy of the belief that the dominance of oil resources as a main source for creating economic growth and achieving a h
... Show MoreDrag reduction (DR) techniques are used to improve the flow by spare the flow energy. The applications of DR are conduits in oil pipelines, oil well operations and flood water disposal, many techniques for drag reduction are used. One of these techniques is microbubbles. In this work, reduce of drag percent occurs by using a small bubbles of air pumped in the fluid transported. Gasoil is used as liquid transporting in the pipelines and air pumped as microbubbles. This study shows that the maximum value of drag reduction is 25.11%.
The principal forms of radiation dosage for humans from spontaneous radiation material are being recognized as radon and its progenitors in the interior environment. Radiation-related health risks are caused by radon in water supply, which can be inhaled or ingested. Materials and Methods: The solid-state CR-39 nuclear trace detectors method was using in this research for measuring accumulation of radioactivity in water supply in different locations of Iraq's southwest corner of Baghdad. In Baghdad district, 42 samples were selected from 14 regions (3 samples out of each region) and put in dosimeters for 50 days. Results: The mean radon concentration was 49.75 Bq/m3, that is lower than the internationally recognized limit of 1100 Bq /m3. Th
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreWelcome to International Journal of Research in Social Sciences & Humanities (IJRSSH). It is an international refereed journal of Social Sciences, Humanities & Linguistics in English published quarterly, both print and online.