The present study examines the main points of differences in the subject of greetings between the English language and the Arabic language. From the review of the related literature on greetings in both languages, it is found that Arabic greeting formulas are more elaborate than the English greetings, because of the differences in the social customs and the Arabic traditions and the Arabic culture. It is also found that Arabic greetings carry a religious meaning basing on the Islamic principle of “the same or more so”, which might lead to untranslatable loopholes when rendered in English.
Background: One of the unique prosthesis for tooth or teeth replacement is the dental implant. Our attempt is using a biomaterial system that is easily obtained and applicable and has the ability to provoke osteoinductive growth factor to enhance bone formation at the site of application. One of these natural polymers is hyaluronic acid. Material and methods: Sixty machined surface implants from commercially pure titanium rod inserted in thirty NewZealand rabbits. Two implants placed in both tibia of each rabbit. The animals scarified at 1, 2 and 4 weeks after implantation (10 rabbits for each interval). For all of animals the right tibia’s implant was control (uncoated) and the left one was experimental (coated with 0.1ml Hyaluro
... Show MoreThis study aims to show, the strength of steel beam-concrete slab system without using shear connectors (known as a non-composite action), where the effect of the friction force between the concrete slab and the steel beam has been investigated, by using finite element simulation.
The proposed finite element model has been verified based on comparison with an experimental work. Then, the model was adopted to study the system strength with a different steel beam and concrete slab profile. ABAQUS has been adopted in the preparation of all numerical models for this study.
After validation of the numerical models, a parametric study was conducted, with linear and non-linear Regression analysis. An equation re
... Show MoreIn situ gel can be defined as a polymer solution administered as a liquid and when exposed to some physiologic condition such as thepH, ionic, temperature modulation or solvent and UV induced gelation undergo to phase transition to a semisolid gel. Ketotifenfumarate belongs to the histamine H1 receptor antagonists, and Ketotifen fumarate is used in the treatment of allergic conditions likeconjunctivitis and rhinitis. This work aims to study the natural polymer effects (xanthan gum,gellan gum) on the properties of pH-trigger in situ ocular gel, then compared the drug-releasing rate of optimized formula with the market ketotifen eye drop. Eightformulations (F1-F8) were prepared using different concentrations of xanthan gum, gellan gum with ca
... Show MoreProtection study of the corrosion behavior of Copper surface was conducted with several concentrations of drug. Experimentally, voltammetric measurements were used to check the inhibition efficiency (% IE) in saline solution of 3.5% NaCl. The results showed an increase in the inhibition efficiency with increasing the concentration of the drug was 95.90%. Theoretical treatment of the drug in the gas phase was performed using the (hyperchem-8.07) program for molecular mechanics and semi-empirical computations. The (PM3) approach was used to determine the heat of formation (1H˚f), binding energy (1Eb), and total energy (ET
Semi-parametric models analysis is one of the most interesting subjects in recent studies due to give an efficient model estimation. The problem when the response variable has one of two values either 0 ( no response) or one – with response which is called the logistic regression model.
We compare two methods Bayesian and . Then the results were compared using MSe criteria.
A simulation had been used to study the empirical behavior for the Logistic model , with different sample sizes and variances. The results using represent that the Bayesian method is better than the at small samples sizes.
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe function of internal auditing has become an important function that aims at achieving objectives that are compatible with these developments and changes that have occurred in many countries in the world, which required the emergence of professional associations and institutes in the profession of internal auditing. Improve the guideline of the internal audit units issued by the Federal Audit Bureau to enhance the efficiency of internal audit performance in Iraqi government units. The researchers adopted the statistical method of proving the hypothesis by constructing a questionnaire that included three main axes: supporting the senior management in adopting the current guide, and the second being the importance of improving t
... Show MoreAbstract
This research aims to examine the correlation and the influence of Authentic Leadership on the contextual performance as a dependent variable, in the departments and Division of the iraqi Ministry of Foreign Affairs To try out with a number of recommendations that contribute to raising the level of contextual performance in the Ministry. Starting from the importance of research in public organizations and its Role in society, the researcher adopted the descriptive analytical approach in accomplishing this research, The 99 people responded exclusively comprehensively, based on questionnaire that is include 28-item, using interviews and field observations as
... Show MoreAn edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show More