The aim of this paper is to prove a theorem on the Riesz means of expansions with respect to Riesz bases, which extends the previous results of [1] and [2] on the Schrödinger operator and the ordinary differential operator of 4-th order to the operator of order 2m by using the eigen functions of the ordinary differential operator. Some Symbols that used in the paper: the uniform norm. <,> the inner product in L2. G the set of all boundary elements of G. ˆ u the dual function of u.
This study was aimed to assess the impact of vermicompost, glutathione, and their interaction on beetroot (Beta vulgaris L.) growth, yield, and antioxidant traits. The experiment carried out at vegetable field of the College of Agricultural Engineering Sciences - University of Baghdad during fall season 2019. The experiment was conducted using factorial arrangement within Randomized Complete Block Design with two factors and three replicates (3X3X3). Applying vermicompost before cultivation represented the first factor (0, 15, 30 ton.ha-1), which symbolized (V0, V1, V2). Glutathione (0, 75, 150 mg.L-1) which symbolized (G0, G1, G2) represented the second factor. Results showed the superiority of secondary interaction treatment V2G2
... Show MoreDuring the last decade, there has been a concern about the relation between aluminum residuals in treated water and Alzheimer disease, and more interest has been considered on the development of natural coagulants. The present study aimed to investigate the efficiency of alum as a primary coagulant in conjunction with mallow, Arabic gum and okra as coagulant aids for the treatment of water samples containing synthetic turbidity of kaolin. Jar test experiments were carried out for initial raw water turbidities 100, 200 and 500 (NTU). The optimum doses of alum, mallow, Arabic gum and okra were 20, 2, 1 and 1 mg/L for100 NTU turbidity level, 35, 4, 2 and 3 mg/L , for 200NTU turbidity level and 50, 8, 10 and 8 mg/L for 500 NTU turbidity leve
... Show MoreThis research aims to investigate the thermal performance of different thermal composite insulators, wrapped around a closed-loop copper pipe (CLP). To achieve this aim a system was designed and manufactured. It is consisted of closed water tank insulated by Rock Wool, and supplied with two electric heaters, two thermostat, a flow meter, a water pump, digital temperature scales, and four series of (CLP).
Six insulators were prepared namely; composites of Impregnated Fiberglass with Elastoclad and foaming Rubber (FER), Impregnated Fiberglass with Elastoclad resin and Polymeric Membrane (FEM), Impregnated Fiberglass with Polyurethane thermoset resin and Foaming Rubber (FUR), Impregnated Fiberglass with Polyurethane thermoset resin and P
Background: This review aims to discuss various canine retraction techniques using frictionless mechanics. Methods: Between 1930 and February 2022, searches were conducted about various canine retraction techniques using fixed orthodontic appliances in various databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and manual searching. Results: After removing the duplicate articles, publications that described how to use archwires to perform canine retraction with the archwires were included. Conclusions: The pros and cons of various canine retraction techniques using archwires were thoroughly discussed. T-loop is the preferred spring of all because of it
... Show MoreBackground: This review aimed at explaining different methods of canine retraction along the archwire. Methods: Searching for different methods of canine retraction using fixed orthodontic appliances was carried out using different databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and hand searching from 1930 till February 2022. Results: After excluding the duplicate articles, papers describing the methods of canine retraction along the archwires were included. The most commonly used methods are NiTi closed coil spring and elastic chain. Conclusions: Various methods of canine retraction along the archwires were explained in detail regarding their adv
... Show Morein this work the polymides were prepared as rthemally stable polymers by diffrent ways
In this research, we studied the multiple linear regression models for two variables in the presence of the autocorrelation problem for the error term observations and when the error is distributed with general logistic distribution. The auto regression model is involved in the studying and analyzing of the relationship between the variables, and through this relationship, the forecasting is completed with the variables as values. A simulation technique is used for comparison methods depending on the mean square error criteria in where the estimation methods that were used are (Generalized Least Squares, M Robust, and Laplace), and for different sizes of samples (20, 40, 60, 80, 100, 120). The M robust method is demonstrated the best metho
... Show MoreIn this research, we studied the multiple linear regression models for two variables in the presence of the autocorrelation problem for the error term observations and when the error is distributed with general logistic distribution. The auto regression model is involved in the studying and analyzing of the relationship between the variables, and through this relationship, the forecasting is completed with the variables as values. A simulation technique is used for comparison methods depending
In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show More