The ground pearls, Porphyrophora tritici (Bod.) is a new insect pest on wheat recorded for
the first time from Mousl Province, North of Iraq.
KE Sharquie, SA Al-Mashhadani, AA Noaimi, WB Al-Zoubaidi, Our Dermatology Online/Nasza Dermatologia Online, 2015 - Cited by 10
The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThis paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreIn this study, plastic wastes named (PET and PVC) were used to prepare polymer matrix composite (PMC) which can be used in different applications. Composite materials were prepared by mixing unsaturated polyester resin (UP) with plastic wastes, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with various weight fractions (0, 5,10,15, 20 and 25%) added as a filler in flakes form. In this work, some of the tests that were carried out included (tensile, bending, and compressive strength) as mechanical tests, in addition to (thermal conductivity and water absorption) as physical tests. The values of tensile, compressive strength and Young's modulus of UP increased after
... Show MoreEvaluation of the Antibacterial Efficacy of Electrolyzed Oxidizing Water as an Irrigant against Enterococcus faecalis (An In vitro Study), Noor A Khait*, Muna Saleem Kalaf
A pure posteriorly posterior communicating artery (PCoA) aneurysm represents a surgical challenge. This is mainly when there is a need for good exposure of the aneurysmal neck, sac, PCoA, and anterior choroidal arteries. Ruptured pure posteriorly directed PCoA aneurysm imposes significantly extra challenge as the surgeon undergoes dissection through a tight brain. Even with measures commonly used to attain brain relaxation like the lumbar drain and cisternal fenestration. Here, we describe a technique for posterior temporal pole mobilization (TPM) as an integrated part of microsurgical clipping of ruptured pure posteriorly directed PCoA aneurysms. This technique is implicated in twenty-three successive cases of ruptured PCoA aneurys
... Show MoreBackground: Trauma is one of the most common
clinical problems that confront the maxillofacial
surgeon and radiologist alike. Middle third facial
fractures are diagnosed primarily on the bases of
clinical examination and plain radiographs than can
result in much preoperative speculation.
Objective: To assess the advantages of spiral
computerized tomography over conventional
radiography in the pre-surgical evaluation of middle
third facial fractures.
Methods: Thirty patients with thirty-eight facial
fractures were studied, all patients were examined
clinically, by plain radiography and then by spiral CT.
Results: Of the 38 middle-third fractures, 16
(42.1%) were zygomatic fractures, 8 (21.1%) were