In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a priori and a posteriori error analysis.
This research aims to identify the role that forensic accounting plays on the transparency and quality of the financial statements in trade bank of Iraq and the Gulf Commercial Bank in Babylon. This research came to address the problem that most financial institutions suffer from, which is represented by the lack of transparency and the quality of the financial statements issued in a manner. Annual also the manipulation and fraud in the financial data, which causes a big gap between that institutions and organizational stakeholders. According to the implementation of the research hypothesis and the objectives of the research, a questionnaire was prepared consisting of three axes, the first axis dealing with the demographic distri
... Show MoreLorraine Hansberry’s A Raisin in the Sun (1959) appeared at the beginning of renewed political activity on the part of the blacks; it is a pamphlet about the dream of recognition of black people and the confusion of purposes and means to reach such recognition. It embodies ideas that have been uncommon on the Broadway stage in any period. Situations such as a black family moving into an all-white neighborhood were not familiar before this time; they were just beginning to emerge. In depicting this so realistically, Hansberry depends more on her personal experience as an African American embittered by social prejudices and discrimination.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreDialogue is one of the most important means of calling to the Creator, as it is one of the scientific and verbal activities carried out by a group of interlocutors to present ideas they believe in, and evidence and proofs that express their views and demonstrate the reason for their belief in them, In order to arrive at the truth or a radical solution to a specific problem, so the interlocutor should pay attention to this science, study it and its etiquette, because the purposeful dialogue requires that the funniest of them be the most knowledgeable and knowledgeable about the axis of the hadith, and the funniest must also be able to be convinced of the rule of difference of opinion that does not spoil the issue of friendly They must also c
... Show MoreAbstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreBackground: Lack of durability of the bond of the dental adhesive systems to tooth structure is one of the most important problems in tooth colored restorative work. This in vitro study was performed to evaluate the effect of 2% chlorhexidine gluconate(CHX) on dentin bond strength by using total etch adhesive system at twenty-four hours and three months of water storage. Material and methods:A flat dentin surface was prepared for forty sound human maxillary premolar teeth which were acid etched with 36% phosphoric acid gel after being divided randomly into four groups of ten teeth each according to storage time and CHX application, theCHX was applied for 60 seconds before adhesive application for groups I and III which were tested after twe
... Show MoreBackground: Vitamin D improves innate immunity by enhancing the expression of antimicrobial peptides. The antimicrobial action of cathelicidin is widespread and effective against cariogenic bacteria. This research aimed to investigate the effect of vitamin D deficiency on the level of salivary cathelicidin concerning dental caries experience.
Subjects and Methods: A case-control study was carried out, and the sample was composed of 80 females; the study group involved 40 females with a serum vitamin D concentration of less than 10 ng/ml. In addition to the control group involving 40 females wh
... Show MoreAfter a temporary halt to forced thghebr in different cities of Iraq this methodlogy
opeations returned directiy in the areas of political conflict on the ground which are translated
operations and forced displacement violence es they operations aimed at completing the
forced displacement that occurred after the occupation in(2003)which took an upward curve
publicly after these events and some of which are aimed at the liquidation of some provinces
than any demographic diversity of religious or sectarian or alhens and others aimed at
redemographic distribution within the province itself to produce a net sectarian zones as is the
case in Diyala Nineveh and Babylon Baghdad has the epicenter of sectarian violence and th