Preferred Language
Articles
/
jeasiq-1973
Building standardized Growth Curves for Iraqi Children Under Five Years
...Show More Authors

The growth curves of the children are the most commonly used tools to assess the general welfare of society. Particularity child being one of the pillars to develop society; through these tools, we can path a child's growth physiology. The Centile line is of the important tools to build these curves, which give an accurate interpretation of the information society, also respond with illustration variable age. To build standard growth curves for BMI, we use BMI as an index. LMSP method used for finding the Centile line which depends on four curves represents Median, Coefficient of Variation, Skews, and Kurtosis. These can be obtained by modeling four parameters as nonparametric Smoothing functions for the illustration variable. Maximizing penalized likelihood in the Fisher scoring algorithm includes RS& GS algorithms. The resulting centiles expressed multi-level of body mass index ranging from lack of nutrition to obsess, also LMSP gives good results, and BMI with positive skew increases with age.  Data on the variable applied to Iraqi children under five years of the multiple indicator cluster survey in 2011 and under the supervision of the world health organization (WHO).        

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 10 2020
Journal Name
International Journal Of Pharmaceutical Research
Molecular Interaction in Aqueous Solution of Butanol Isomers at 298.15 K
...Show More Authors

Viscosity (η) of solutions of 1-butanol, sec-butanol, isobutanol and tert-butanol were investigated in aqueous solution structures of ranged composition from 0.55 to 1 mol.dm-3 at 298.15 K. The data of (η/η˳) were evaluated based on reduced Jone - Dole equation; η/η˳ =BC+1. In the term of B value, the consequences based on solute-solvent interaction in aqueous solutions of alcohols were deliberated. The outcomes of this paper discloses that alcohols act as structure producers in the water. Additionally, it has shown that solute-solvent with interacting activity of identical magnitude is in water-alcohol system

Publication Date
Sat Apr 07 2018
Journal Name
Научный форум: Филология, искусствоведение и культурология: сб. ст. по материалам Xiv междунар. науч.- практ. конф. – No 3(14). – М.:
LANGUAGE GLOBALIZATION OR THE LANGUAGE OF GLOBALIZATION
...Show More Authors

Language is an instrument, a tool of culture and a way of communication between the past and the present. No one can know the treasure of human thought and experience in the fields of history, poetry and prose without language as an instrument of communication between cultures and peoples. Language under this description faces many problems, the most important of which is linguistic globalization, which means the flow rate of the strongest language, which has elements of power, domination and control over other languages. In this article, we consider linguistic globalization as a serious problem faced by every language, and we consider its main shortcomings and advantages and its impact on the language and ways of protecting the Arabic lang

... Show More
Publication Date
Fri Jun 15 2018
Journal Name
Преподаватель Xxi век
COMPARATIVE ANALYSIS OF TYPES OF METAPHORS OF RUSSIAN AND ARABIC LANGUAGES
...Show More Authors

Metaphor is one of the most important linguistic phenomena of the artistic text, as it is the expression of the author’s emotions and evaluations, the result of a deep inner transformation of the semantic words and visual means of reflecting the national culture of each people. This paper examines the concept of linguistic metaphors and analyzes its types in the Russian and Arabic linguistics, provides a comparative analysis of metaphors in Russian and Arabic — all this allows to conclude that metaphorization is characteris- tic of different parts of speech. In the Russian language stylistic differentiation of the metaphors expressed more than in Arabic, so translation of many “sty- listic” metaphors from Russian into Arabic due to

... Show More
Publication Date
Tue May 03 2022
Journal Name
Teikyo Medical Journal
Tooth agenesis and palatal dimensions associated with craniofacial deformity- Cone Beam Computed Tomography based study
...Show More Authors

Cleft / palate is one of the common congenital deformities in craniofacial region, associated with different types of dental anomalies like (Tooth agenesis, impaction, and supernumerary teeth) with marked changes in palatal dimensions. This study aimed to determine the prevalence of teeth agenesis and dental anomalies in cleft lip/palate patients using CBCT, and to compare the palatal dimension of cleft group with control subjects. Twenty-eight cleft cases collected during the period from 2015 to 2022, CBCT images evaluated, the study sample classified into two groups (14 bilateral and 14 unilateral cleft lip/palate) and the non-cleft control group (14 CBCT images). The presence of dental anomalies was assessed in relation to clef

... Show More
Publication Date
Sat Mar 31 2018
Journal Name
Journal Of Engineering
Seismic Response of Nonseismically Designed Reinforced Concrete Low Rise Buildings
...Show More Authors

In this paper, the time-history responses of a square plan two-story reinforced concrete prototype building, considering the elastic and inelastic behavior of the materials, were studied numerically. ABAQUS software was used in three-dimensional (3D) nonlinear dynamic analysis to predict the inelastic response of the buildings. Concrete Damage Plasticity Model (CDPM) has been used to model the inelastic behavior of the reinforced concrete building under seismic excitation. The input data included geometric information, material properties, and the ground motion. The building structure was designed only for gravity load according to ACI 318 with

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Counting Functions to Generate The Primes in the RSA Algorithm and Diffie-Hellman Key Exchange
...Show More Authors

        The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods  depended on selecting the primes p and q in order  to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article   gives  new construction  of the  RSA  algorithm and DH key  exchange using the

primes p,qfrom areal number x.

View Publication Preview PDF
Crossref
Publication Date
Wed Oct 10 2018
Journal Name
Al-kindy College Medical Journal
Recurrent Laryngeal Nerve Injury With Versus Without Nerve Identification In Different Thyroidectomy Procedures
...Show More Authors

Background: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.

Type of the study: cross –sectional study.

Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
F-Compact operator on probabilistic Hilbert space
...Show More Authors

This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
Study the correlation between Sunspot Number and Solar Flux during Solar Cycle 24.
...Show More Authors

Abstract

     In this research, a study of the behavior and correlation between sunspot number (SSN) and solar flux (F10.7) have been suggested. The annual time of the years (2008-2017) of solar cycle 24 has been adopted to make the investigation in order to get the mutual correlation between (SSN) and (F10.7). The test results of the annual correlation between SSN & F10.7 is simple and can be represented by a linear regression equation. The results of the conducted study showed that there was a good fit between SSN and F10.7 values that have been generated using the suggested mutual correlation equation and the observed data.

View Publication Preview PDF
Crossref (1)
Crossref