Due to the lack of statistical researches in studying with existing (p) of Exogenous Input variables, and there contributed in time series phenomenon as a cause, yielding (q) of Output variables as a result in time series field, to form conceptual idea similar to the Classical Linear Regression that studies the relationship between dependent variable with explanatory variables. So highlight the importance of providing such research to a full analysis of this kind of phenomena important in consumer price inflation in Iraq. Were taken several variables influence and with a direct connection to the phenomenon and analyzed after treating the problem of outliers existence in the observations by (EM) approach, and expand the sample size (n=36) to be (n=51) to face the limitation of the data. After that was a comprehensive analysis taking into account the size of the new sample.
Hydatid disease is a zoonotic infection caused by Echinococcus species. The cystic form of this infection mostly involves liver and lung. Hydatid disease of the parotid gland even in endemic regions is a very rare entity that may be easily overlooked in daily practice. Herein, I present a case report of a 60-year-old Iraqi female patient who presented with a progressively painless mass in her right parotid. It was diagnosed radiologically as a hydatid cyst and was excised successfully. Histopathologic examination of the resected specimen confirmed the hydatid cyst. This case emphasizes the importance of considering hydatidosis in the differential diagnosis of any parotid mass, especially in endemic countries.
 
... Show MoreUnderstanding, promoting, and teaching media literacy is an important societal challenge. STEM educators are increasingly looking to incorporate 21st century skills such as media literacy into core subject education. In this paper we investigate how undergraduate Computer Science (CS) students can learn media literacy as a by-product of collaborative video tutorial production. The paper presents a study of 34 third-year CS undergraduates who, as part of their learning, were each asked to produce three video tutorials on Raspberry Pi programming, using a collaborative video production tool for mobile phones (Bootlegger). We provide results of both quantitative and qualitative analysis of the production process and resulting video tutorials,
... Show MoreA gantry robot is one of the most common types of industrial robots with linear movement. This type of robot is also known as a Cartesian or linear robot. It is an automated industrial system that moves along linear paths, enabling it to create a 3D envelope of the space in which it operates. A robot of this type has a standardised configuration process because it can have several sets of axes, such as X, Y and Z. The gantry robot picks up products from several places, so it can search through various locations. Afterwards, it carefully deposits the products on a conveyor belt for the next stage of the procedure or final shipment. This integration enables continuous and automated material flow
... Show MoreThis study concerns the removal of a trihydrate antibiotic (Amoxicillin) from synthetically contaminated water by adsorption on modified bentonite. The bentonite was modified using hexadecyl trimethyl ammonium bromide (HTAB), which turned it from a hydrophilic to a hydrophobic material. The effects of different parameters were studied in batch experiments. These parameters were contact time, solution pH, agitation speed, initial concentration (C0) of the contaminant, and adsorbent dosage. Maximum removal of amoxicillin (93 %) was achieved at contact time = 240 min, pH = 10, agitation speed = 200 rpm, initial concentration = 30 ppm, and adsorbent dosage = 3 g bentonite per 1L of pollutant solution. The characterization of the adsorbent, modi
... Show MoreBackground: This study aimed to evaluate the outcome of long-term results of dacryocystorhinostomy (DCR) techniques in specialized eye care center in Iraq.
Subjects and Method: This is a prospective study of 650 patients from July 2014 to July 2019 with nasolacrimal duct obstruction in Ibn Al Haitham Eye Teaching Hospital. A preoperative questionnaire was done, then one month, three months, six months and one year postoperatively. The success of surgery defined as follow; Absence of epiphora completely, Resolve of dacryocele or mucocele or any new attack of daryocystitis, Appearance of fluorescein dye from nose in fluorescein disappearance test, Successful irriga
... Show MorePiezoelectric structures are nowadays used in many different applications. A better understanding of the influence of material properties and geometrical design on the performance of these structures helps to develop piezoelectric structures specifically designed for their application. Different equivalent circuits have been introduced in the literature to investigate the behaviour of piezoelectric transducers. The model parameters are usually determined from measurements covering the characteristic frequencies of the piezoelectric transducer. This article introduces an analytical technique for calculating the mechanical and electrical equivalent system parameters and characteristic frequencies based on material properties and geom
... Show MoreEriobotrya japonica Lindl., named as loquat, is a subtropical fruit tree of the family Rosaceae which is well known medical plant originated in Japan and China. Loquat portions, like leaves, peels and fruits have been shown to possess various health usefulnesses. In Chinese classical medicine, it is vastly utilized in many illnesses, like gastroenteric disorders, diabetes mellitus, pulmonary inflammatory diseases and chronic bronchitis. Loquat plant contain many active constituents, such as flavonoids, carotenoids, vitamins, polyphenolic compounds, other that have many biological effects like anti-tumor, anti-diabetic, anti-inflammatory, anti-mutagenic, antioxidant, antiviral, antitussive, hepatoprotective and hypoli
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More