The current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a number of
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreCarbon nanotubes (CNTs) were synthesized via liquefied petroleum gas (LPG) as precursor using flame fragments deposition (FFD) technique. In vitro, biological activates of carbon nanotubes (CNTs) synthesized by FFD technique were investigated. The physiochemical characterizations of synthesized CNTs are similar to other synthesized CNTs and to the standard sample. Pharmaceutical application of synthesized CNTs was studied via conjugation and adsorption with different types of medicines as promote groups. The conjugation of CNTs was performed by adsorption the drugs such as sulfamethoxazole (SMX) and trimethoprim (TMP) on CNTs depending on physical properties of both bonded parts. The synthesized CNTs almost have the same performance in a
... Show MoreABSTRICT:
This study is concerned with the estimation of constant and time-varying parameters in non-linear ordinary differential equations, which do not have analytical solutions. The estimation is done in a multi-stage method where constant and time-varying parameters are estimated in a straight sequential way from several stages. In the first stage, the model of the differential equations is converted to a regression model that includes the state variables with their derivatives and then the estimation of the state variables and their derivatives in a penalized splines method and compensating the estimations in the regression model. In the second stage, the pseudo- least squares method was used to es
... Show MoreBackground: Periodontal disease (PD) is a chronic inflammatory condition characterized by destruction of supporting structures of the teeth. Intelligence quotient (IQ) was potentially reported to significantly associated with prevalence of gingivitis. Mild gingivitis was obtained in high IQ levels while moderate gingivitis may be attributed to poor oral hygiene seen among the subjects having low IQ levels. Method: One hundred volunteers aged between 20-45 years old were enrolled in this study, patients were equally divided into right- and left-handed (50 patients each)and each group then subdivided into patients with healthy gingiva(10), patients with gingivitis (20), and patients suffering from periodontitis (20).An IQ questionnaire was p
... Show MoreTo compare the corneal epithelial thickness profile in patients with dry eyes and keratoconus suspect with normal healthy eyes.
The study involved 120 eyes with an age range from 19 to 30 years. Forty eyes had normal corneal topography and no dry eyes. Forty eyes had dry eyes but had normal corneal topography. The last 40 eyes were keratoconus suspect and had no symptoms or signs of dry eyes.
Central epithelial thickness was not different statistically for all eyes. ( p-value: 0.1). The superior epithelial thickness was 53.5 µm ±3.1 in the control
The Purpose of this research is a comparison between two types of multivariate GARCH models BEKK and DVECH to forecast using financial time series which are the series of daily Iraqi dinar exchange rate with dollar, the global daily of Oil price with dollar and the global daily of gold price with dollar for the period from 01/01/2014 till 01/01/2016.The estimation, testing and forecasting process has been computed through the program RATS. Three time series have been transferred to the three asset returns to get the Stationarity, some tests were conducted including Ljung- Box, Multivariate Q and Multivariate ARCH to Returns Series and Residuals Series for both models with comparison between the estimation and for
... Show More