This paper is concerned with the quaternary nonlinear hyperbolic boundary value problem (QNLHBVP) studding constraints quaternary optimal classical continuous control vector (CQOCCCV), the cost function (CF), and the equality and inequality quaternary state and control constraints vector (EIQSCCV). The existence of a CQOCCCV dominating by the QNLHBVP is stated and demonstrated using the Aubin compactness theorem (ACTH) under appropriate hypotheses (HYPs). Furthermore, mathematical formulation of the quaternary adjoint equations (QAEs) related to the quaternary state equations (QSE) are discovere so as its weak form (WF) . The directional derivative (DD) of the Hamiltonian (Ham) is calculated. The necessary and sufficient conditions for optimality (NCSO) theorems for the proposed problem are stated and proved.
The goals of endodontic preparation were to shape and clean the space of the root canal and remove microorganisms, affected dentin and pulp, the apical foramen and the canal curve should be protected from being transported during endodontic canal preparation. The aim of this study was to evaluate the curve straightening of curved root canals and apical transportation after preparation with four rotary systems. Forty mesial roots of the lower 1st molars teeth only the mesiobuccal canals were used, these roots were immersed into cold clear acrylic , the teeth roots divided into four groups according to rotary system used for preparation of the canals (ten roots for each group):. group I: ProTaper Next rotary system, group II: IRaCe Plus rotar
... Show More
Student dropout is a problem for both students and universities. However, in the crises that Lebanon is going through, it is becoming a serious financial problem for Lebanese private universities. To try to minimize it, it must be predicted in order to implement the appropriate actions. In this paper, a method to build the appropriate prediction system is presented. First, it generates a data source of predictor variables from student dataset collected from a faculty of economic sciences in Beirut between 2010 and 2020. Then, it will build a prediction model using data classification techniques based on identified predictor variables and validate it. Using open-source software and free cloud environments, a prediction program w
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreUnder high concentrations of antibiotics, a fraction of the bacterial population exhibits a phenomenon known as persistence. Toxin- system (TA system) has been reported to be involved in the formation of E. coli, Mycobacterium, and S. aureus persisters. In this study, the ability of thirty Iraqi isolates of MRSA to form in vitro persister cells after exposure to three different antibiotics (Ceftriaxone 30 µg, Mecillinam 10 µg, and Mupirocin 20 µg) was examined by TD test. Additionally, efflux pump inhibitor [Fluphenazine 0.25 mg/ml] was combined with the antibiotic that triggered persister formation. The distribution of mazEF and yefM-yoeB (Type II TA system) in the tested isolates was detected by PCR. 91% of Mupirocin su
... Show MoreThis work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show MoreThis Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters (as done in the first edition 2019). Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. While the revised new chapters have been added (as the curr
... Show MoreThis Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters (as done in the first edition 2019). Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. While the revised new chapters have been added (as the curr
... Show MoreThe principal aim of this research is to use the definition of fuzzy normed space
to define fuzzy bounded operator as an introduction to define the fuzzy norm of a
fuzzy bounded linear operator then we proved that the fuzzy normed space FB(X,Y)
consisting of all fuzzy bounded linear operators from a fuzzy norm space X into a
fuzzy norm space Y is fuzzy complete if Y is fuzzy complete. Also we introduce
different types of fuzzy convergence of operators.
The calibration of the three meter Baghdad University Radio Telescope (BURT) has been performed using two types of calibrations: Antenna Position calibration, and Detector calibration. The sun is used as a reference source to calibrate the telescope. The antenna position Azimuth (Az), and Elevation (El) are calibrate according to sun's azimuth and elevation in the date (11/10/2017; at time 10:19 AM). A calibration report is designed to illustrate the calibration parameters for each specific date and time. The detector calibration is representing a study for power spectrum response for the sun according to radio telescope frequency band (1.3 GHz – 1.5 GHz) with central frequency (1.42 GHz). Drift Scan function in the telescope's softwar
... Show More
Background: Diabetes mellitus is a chronic disease with an increasing prevalence worldwide and characterized by an increase in oxidative stress and inflammation. The most important factor that is responsible for oxidative stress and production of reactive oxygen species (ROS) is hyperglycemia. The major targets of ROS are proteins. The most common and widely used biomarker of severe oxidative protein damage is protein carbonyl content.
The study was designed to assess the serum level of protein carbonyl as a marker of protein oxidation in patients with type 2 diabetes mellitus and to evaluate the effect of age, body weight, waist circumference, diabetic control and disease duration on the level
... Show More