In this paper, an approximate solution of nonlinear two points boundary variational problem is presented. Boubaker polynomials have been utilized to reduce these problems into quadratic programming problem. The convergence of this polynomial has been verified; also different numerical examples were given to show the applicability and validity of this method.
In the 20th century, the concept of "sarcasm" has relatively prevailed, and in this sense, it is a method in the art of conversation that wants to keep the question about the intended meaning, that is, "saying something and suggesting its opposite."
There are other concepts that indicate that sarcasm is saying something in a way that provokes the recipient of the statement an infinite number of different interpretations, with multiple readers of different interpretations. While the philosophy of irony stands by the standards of things, exaggeration or minimization, this manipulation takes place within the enjoyment. However, it's a method to present sharp criticism in an atmosphere of criticism that differs from generation to gener
The purpose of this study was to evaluate the epidemiological characteristics of the mandibular fractures relating to gender, age, the etiology of injury, and the rendered treatment modalities and complications. The data of the patients who sustained mandibular fractures were retrieved and were analyzed retrospectively, and based on these data a descriptive analysis was conducted. A total of 112 patients were included in this study; the most common cause was road traffic accidents (RTAs) followed by assaults and missile injuries. The most frequently involved age group was 11 to 20 years, treatment modalities included conservative, closed reduction and indirect fixation, and open reduction and internal fixation (ORIF) in 11.6, 79.5, and 8.9%
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreIn this research investigation, a total of eighteen diverse tetra- and penta-lateral cyclic compounds were synthesized. These included 1,3,4-thiadiazole, thiazolidin-4-one (via an alternative method), 1,2,4-triazole, carbothioamide, thiazole-4-one, azetidin-2-one, and oxazole. The synthesis procedure entailed a sequence of reactions. The thiazolidine-4-one 1 was obtained by reaction p-aminobenzoic acid with thiosemicarbazide, followed by treatment with p-tolualdehyde to produce Schiff base 2. Reaction Schiff base 2 with mercaptoacetic acid in dry benzene was carried out to produce thiazolidine-4-one 3. In another synthesis pathway, the esterification of p-nitro benzoic acid with ethanol in the presence of sulfuric acid was
... Show MoreObjective: The aim of this study was to compare the marginal microleakage between bulk-fill, preheated bulk-fill, and bulk-fill flowable composite resins above and below cemento-enamel junction (CEJ) using micro-computed tomography. Methods: Sixty freshly extracted premolar teeth were prepared with a slot shaped cavities of a total of 120 Class II: 3mm (bucco-lingual), 2mm (mesio-distal) with mesial-gingival margin located 1mm coronal to CEJ, and distal gingival margin located 1mm apical to the CEJ. The samples were randomly divided into two main groups according to the restorative material (Tetric EvoCeram and 3M Filtek), and each group was further sub-divided into three subgroups according to the consistency (bulk fill, preheated bulk fil
... Show MoreDAIRMD Professor Hayder R. Al-Hamamy, **Professor Adil A. Noaimi, **Dr. Ihsan A. Al-Turfy, IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2015
This research is an attempt to develop exercise with weights to strengthen some of the striking muscles in the shoulder and arm and to develop the accuracy of the smash and rectum skills. The importance of this paper lies in the study of moments of force to achieve the ability to control muscular work and to explore the impact of physical and skill exercises with weights to develop moments of force for some muscles. The experimental method on a sample of players, selected according to the intentional method, including ( 9) advanced players representing Air Force Club participating in the Premier League for season 2011-2012. It is concluded that the exercises proposed have their effective impact on developing the variables of moments force f
... Show MoreThroughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.