This study aimed new indications that may clarify the relationships between the total and standard lengths, and the length of the otolith, as well as the thickness and weight of these bones compared to the body weights of two different species of invasive fish in the Iraqi aquatic environment, the common carp
The Islamic architectural heritage constitutes a civilized fortune that has to be preserved and protected and work should be done to maintain its development to be more convenient for the circumstances of the age and the civilization transformations. Due to the fact that architecture represents the civilization pot and cultural identity, its originality has to be preserved and work has to be done to prevent the strange architectural invasion that changes its character and make it lose the identity and the character and detached from its roots and environment.
Decoration, in the interior design, as a concept is connected to ornamentation process of interior spaces, which is a process of adding certain items
... Show Moren this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show MoreThe study aims to show the correlation between inflation rates and the volume of private sector deposits in Jordan on one hand, and Amman Stock Exchange index for the period of 1999-2017. The study used the “Vector Auto Regression” model. Different types of tests are used such as: The “Johansen Co integration” test of joint integration, “Granger causality” test, the “Analysis of Variance Decomposition”, and “Impulse response Function” test.
The results showed there is a positive-one-way causal effect from Amman Stock Exchange index to inflation. Also, a one-way causal effect that comes from Amman Stock Exchange index to the size of private sec
... Show MoreObjective(s): The aim of the study was to identify the prevalence of overweight and obesity in adolescence and
to estimate the effect of socio- demographic and health behaviors that predicting obesity in adolescents.
Methodology: A cross-sectional descriptive study was being carried out at three public Arabic secondary
schools in Erbil city from October 1
st 2010 to January 30th 2011. A systematic randomly sample size of 461 students
was selected.
Results: In this study, the age of (46.2%, 122) of males students were ranged between (17- 18.9) years old compared
to females students (74.1%, 146) their age ranged between (15 -16.9) years old. About (3.4%, 9) of males
adolescents having overweight while all female ado
The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreBACKGROUND: Diabetes Mellitus is a complex chronic illness that has increased significantly around the world and is expected to affect 628 million in 2045. Undiagnosed type 2 diabetes may affect 24% - 62% of the people with diabetes; while the prevalence of prediabetes is estimated to be 470 million cases by 2030. AIM OF STUDY: To find the percentage of undiagnosed diabetes and prediabetes in a slice of people aged ≥ 45years, and relate it with age, gender, central obesity, hypertension, and family history of diabetes. METHODS: A cross sectional study that included 712 healthy individuals living in Baghdad who accepted to take part in this study and fulfilling the inclusion and exclusion criteria.
... Show MoreThis study investigated a novel application of forward osmosis using different types of draw solutions for oilfield produced water treatment from the East Baghdad oilfield affiliated to the Midland Oil Company (Iraq). Magnesium chloride (MgCl2) and magnesium sulfate (MgSO4) were used as draw solutions in forward osmosis process to evaluate their effectiveness. Experiments were conducted in a laboratory scale forward osmosis system with cellulose triacetate hollow fiber membrane. In this work, sodium chloride solution was used as a feed solution with a concentration of 76 g/L (same concentration as the East Baghdad oilfield produced water) and the applied external pressure on the feed solution side was 2 bar. The impact of draw solution (DS)
... Show More