The Video effect on Youths Value
This work presents the study of the dark current density and the capacitance for porous silicon prepared by photo-electrochemical etching for n-type silicon with laser power density of 10mw/cm2 and wavelength (650nm) under different anodization time (30,40,50,60) minute. The results obtained from this study shows different chara that different characteristic of porous diffecteristics for the different porous Silicon layers.
The present paper discusses one of the most important Russian linguistic features of Arabic origin Russian lexes denoting some religious worship or some political and social positions like Qadi, Wally, Sultan, Alam, Ruler, Caliph, Amir, Fakih, Mufti, Sharif, Ayatollah, Sheikh.. etc. A lexical analysis of the two of the most efficient and most used words of Arabic origin Russian lexes that are “Caliph and Sheikh” is considered in the present study. The lexicographic analysis of these words makes it possible to identify controversial issues related to their etymology and semantic development.
The study is conducted by the use of the modern Russian and Arabic dictionary, specifically, (Intermediate lexicon Dictionary
... Show MoreThe research aims to estimate missing values using covariance analysis method Coons way to the variable response or dependent variable that represents the main character studied in a type of multi-factor designs experiments called split block-design (SBED) so as to increase the accuracy of the analysis results and the accuracy of statistical tests based on this type of designs. as it was noted in the theoretical aspect to the design of dissident sectors and statistical analysis have to analyze the variation in the experience of experiment )SBED) and the use of covariance way coons analysis according to two methods to estimate the missing value, either in the practical side of it has been implemented field experiment wheat crop in
... Show MoreBackground: Rhinosinusitis is an inflammatory disorder that refers to inflammation of the nose and paranasal sinuses. Recent studies show that serum IL-33, periostin, ARGE and sST2 had the role in the pathogenesis of chronic rhinosinusitis as an easy, non-invasive and readily available (biomarker) for diagnosis of chronic rhinosinusitis. We tested for correlations of IL-33, periostin, ARGE and sST2 between acute and chronic rhinosinusitis in compare to healthy people. This study aimed to Measure serum levels of periostin, IL-33, sST2, and ARGE biomarkers in patients ARS and CRS. Materials and Methods: We collected serum of 30 patients with acute rhinosinusitis, 30 with chronic rhinosinusitis, and 30 controls to examine serum levels of IL-3
... Show MoreThis paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.
Background: The normal decline in systolic blood pressure during recovery phase of treadmill exercise dose not occur in most patients with coronary artery disease, in others recovery values systolic blood pressure may even exceed the peak exercise value. Objectives: Treadmill exercise test parameters indicating the presence and extent of coronary artery disease have traditionally included such as exercise duration, blood pressure and ST-segment response to exercise. The three –minute systolic blood pressure ratio is another important indicator of presence and significance of coronary artery disease is useful and obtainable measure that can be applied in all patients who are undergoing stress testing for evaluation of suspected is
... Show MoreBecause of the experience of the mixture problem of high correlation and the existence of linear MultiCollinearity between the explanatory variables, because of the constraint of the unit and the interactions between them in the model, which increases the existence of links between the explanatory variables and this is illustrated by the variance inflation vector (VIF), L-Pseudo component to reduce the bond between the components of the mixture.
To estimate the parameters of the mixture model, we used in our research the use of methods that increase bias and reduce variance, such as the Ridge Regression Method and the Least Absolute Shrinkage and Selection Operator (LASSO) method a
... Show MoreMechanical and thermal properties of composites, consisted of unsaturated polyester resin, reinforced by different kinds of natural materials (Orange peels and Date seeds) and industrial materials (carbon and silica) with particle size 98 µm were studied. Various weight ratios, 5, 10, and 15 wt. % of natural and industrial materials have been infused into polyester. Tensile, three-point bending and thermal conductivity tests were conducted for the unfilled polyester, natural and industrial composite to identify the weight ratio effect on the properties of materials. The results indicated that when the weight ratio for polyester with date seeds increased from 10% to 15%, the maximum Young’s modulus decreased by 54%. When the weight rat
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More