Local and global bifurcations of food web model consists of immature and mature preys, first predator, and second predator with the current of toxicity and harvesting was studied. It is shown that a trans-critical bifurcation occurs at the equilibrium point
Background: Hyperfunction of the muscles of the upper lip is considered as the most common cause of excessive gingival display (EGD). The aim of this study was to demonstrate the effectiveness of botulinum toxin (BT) injection as a conservative treatment for EGD due to muscular hyperfunction and to compare the outcome of 2 injection methods. Material and methods: This study included 40 participants who were randomly assigned into 2 groups of 20 each, The first group received 2.5IU BT injection at 1 point per side (2-points group), while the second group received a total of 5 IU of BT at 2 points per side (4-points group). The outcome variables were the reduction in the central and lateral gingival display expressed as the difference between
... Show MoreThe presence and prevalence of V. cholerae were investigated in forty five water samples collected from different locations of Tiger River/ Baghdad city. Twenty one isolates were isolated by adopting a simple isolation techniques. The final identification revealed that only three isolates were confirmed as V. cholerae. They were named 1J, 1R and Dial 131 which are all serogrouped as non-O1. Toxin Coregulated Pili (TCP) and heat labile enterotoxin (LT) were determined in only the environmental isolate 1J while non of the isolates produced heat stabile toxin (ST). The purification scheme was improved, few steps were adopted to include back extraction of ammonium sulfate, saturation between 80-20%, desalting through Sephadex G25, and gel filt
... Show MoreIn the present study, an attempt has been made to experimentally investigate the flexural performance of ten simply supported reinforced concrete gable roof beams, including solid control specimen (i.e., without openings) and nine beams with web openings of different dimensions and configurations. The nine beams with openings have identical reinforcement details. All beams were monotonically loaded to failure under mid-span loading. The main variables were the number of the created openings, the total area of the created openings, and the inclination angle of the posts between openings. Of interest is the load-carrying capacity, cracking resistance and propagation, deformability, failure mode, and strain development that represent the behav
... Show MoreDeep beams are used in wide construction fields such as water tanks, foundations, and girders in multi-story buildings to provide certain areas free of columns. In practice it is quite often occurring to create web opening in deep beams to supply convenient passage of ventilation ducts, cable channels, gas and water pipes. Experimental studies of ten 10 deep beams were carried out, where two of them are control specimens without openings and eight with large web openings in the shear spans. The variables that have been adopted are the ratio of the shear span to the overall depth of the member cross-section, location and dimensions of the opening. Test results showed that there was a decrease in the load carrying capacity of deep bea
... Show MoreDeep beams are used in wide construction fields such as water tanks, foundations, and girders in multi-story buildings to provide certain areas free of columns. In practice it is quite often occurring to create web opening in deep beams to supply convenient passage of ventilation ducts, cable channels, gas and water pipes. Experimental studies of ten 10 deep beams were carried out, where two of them are control specimens without openings and eight with large web openings in the shear spans. The variables that have been adopted are the ratio of the shear span to the overall depth of the member cross-section, location and dimensions of the opening. Test results showed that there was a decrease in the load carrying capacity of deep bea
... Show MoreAs the process of estimate for model and variable selection significant is a crucial process in the semi-parametric modeling At the beginning of the modeling process often At there are many explanatory variables to Avoid the loss of any explanatory elements may be important as a result , the selection of significant variables become necessary , so the process of variable selection is not intended to simplifying model complexity explanation , and also predicting. In this research was to use some of the semi-parametric methods (LASSO-MAVE , MAVE and The proposal method (Adaptive LASSO-MAVE) for variable selection and estimate semi-parametric single index model (SSIM) at the same time .
... Show MoreThe prophet was against the monopoly . He warned the monopolies with great punishment . inspite of the high price in his time, he did not price , so did the rightely guided caliphes and the ummayads . Umar b abid al-aziz had been asked to price but he refused and said ―the prophet said ― ― God grieves ,pleases and fixes price ―
The monopoly was declard announce in the third and the fourth centuries of A.H . because of the weakness of the Islamis State and it’s failure to find the real reasons of it’s existence. Besides that they used the guaranty system in collecting the money . The guaranted shared in monopoly the food-stuff and sold it in high price .Add to that the foreign control on the executive power ,not to be menti
This paper aims at discovering the real implication of deduction in the Arabic culture
with concentration on its applications in Arabic grammar, logic, and fundamentals of Islamic
legislations. Some light has been shed on deduction in the Arabic culture but most of recent
works did not analyze deduction according to the pragmatic analysis. This paper will answer
the following questions:
to what extent deduction in Arabic grammar could comprehend with deduction l logic and
fundamentals of thinking in Islamic thought?
how can we find the deduction thinking in the Qur’anic surah if Ghafir?
Can we find parts of deduction in the surah?
The methodology in this paper is descriptive analytical. This metho
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show More