Recovery of time-dependent thermal conductivity has been numerically investigated. The problem of identification in one-dimensional heat equation from Cauchy boundary data and mass/energy specification has been considered. The inverse problem recasted as a nonlinear optimization problem. The regularized least-squares functional is minimised through lsqnonlin routine from MATLAB to retrieve the unknown coefficient. We investigate the stability and accuracy for numerical solution for two examples with various noise level and regularization parameter.
Introduction: Due to the high prevalence of diseases associated with obesity. There are several factors, including the genetic factors, it is known that the genes Fat mass and obesity-associated FTO rs9939609, the lipoprotein lipase (LPL) Ser447Ter, and the chymase 1 (CMA1) -1903A > G are associated with lipoprotein metabolism. The aim of the present investigation was to study the association of the FTO, LPL, and CMA1 genes with obesity in the children and adolescents population of the Rostov region, Russia. Methods: In a case-control study involving 500 children and adolescents aged from 3 to 17 years, the association between the genetic polymorphisms of the FTO rs9939609, LPL Ser447Ter (rs328) and CMA1 -1903A > G (rs1800875) with the obes
... Show MoreThe widespread house sparrow Passer domesticus biblicus has a close association with humans and inhabits almost all ecosystems near human settlements in Iraq. It is exposed to different kinds of parasites in its habitats. Examining of house sparrow for the cestode parasites revealed that 25 specimens of 56 were infected with Raillietina echinobothrida. Intensity among infected male and female hosts with this cestode and its description is provided and discussed. The present finding constitutes the first record for this parasite in house sparrow in Iraq.
CUPPER(||)AND MERCURY (||)Complexes WITH SCHIFF BASE LIGAND FROM BENZIDIN WITH ISATIN AND BENZOIN:SYNTHESIS,SPECTRAL CHARACTERIZATION, THERMAL STUDIES AND BIOLOGICAL ACTIVITIES
The current research discusses the jurisprudence of the argumentative meaning in the Qur’an, and it is one of the general methods of responses in the Qur’an, as well as the argumentative approach to the recitations of the readers and directing their meanings. I have chosen a model for three verses from Surat Al-An’am, in which there are seven frequent recitations and seven odd ones, on a topic related to theology and faith; It forms the centerpiece of the argument verses in Surat Al-An'am; It contains the jurisprudence of dealing with infidels and dissenters, turning away and forbidding insulting what they claim besides God in the event of corruption, and God Almighty’s decree and wisdom in the occurrence of unbeli
... Show MoreThe study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreAR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More