An approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
This research presents a study for precipitating phosphorus (as phosphate ion) from simulated wastewater (5ppm initial concentration of phosphorus) using calcium hydroxide Ca(OH)2 solution. The removal of phosphorus by Ca (OH)2 solution is expected to be very effective since the chemical reaction is of acid-base type but Ca(OH)2 forms complex compound with phosphate ions called. Hydroxyapatite Ca5 (PO4)3OH. hydroxyapatite is slightly soluble in water. This research was directed towards sustainable elements as phosphorus. Kinetics of the dissolution reaction of hydroxyapatite was investigated to find the best factors to recover phosphorus. The effect of con
... Show MoreThis study deals with free convection heat transfer for the outer surface of two
cylinders of the shape of (Triangular & Rectangular fined cylinders with 8-fins),
putted into two different spaces; small one with dimension of (Length=1.2m,
height=1m, width=0.9m) and large one with dimension of (Length=3.6m, height =3m,
width=2.7m). The experimental work was conducted with air as a heat transport
medium. These cylinders were fixed at different slope angles (0o, 30o, 60o and 90o)
.The heat fluxes were (279, 1012, 1958, 3005, 4419) W/m2, where heat transferred by
convection and radiation. In large space, the results show that the heat transfer from
the triangular finned cylinder is maximum at a slope angle equals
Abstract Background: The prevalence of heart failure (HF) continues to increase with an increase in the aging population. Palliative care should be integrated into routine disease management for all patients with serious illness, regardless of settings or prognosis. Objectives: The purposes of this study were to determine the level of knowledge of nurses concerning palliative care for patients with heart failure after implementation of instructional program. Design: The study was a quasi-experimental study and consists of 60 nurses. Setting: The study was conducted between17th November 2021, to 10th February 2022, at three teaching hospitals in Baghdad city, Iraq. Method: A non-probability (purposive) sample was utilized, nurses who agreed
... Show More
Patient aggression is a global health care problem. This study examined the impact of patient aggression on the quality of care that patients receive as perceived by their family members and the ethical challenges involved from the nurse’s perspective. A descriptive–analytical method was used. The participants of this study were nurses working on psychiatric units and family members of patients in Iraq. Two questionnaires were used: one on nursing care quality and one on ethical challenges in clinical situations. The results showed that the quality of care for these patients was reduced, with a
This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima
... Show MoreIn this work, the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt
... Show MoreMy research deals with the positions that the Prophet (PBUH) distressed. And condolences to those who lost her father and other problems and calamities that impede the life of women, has been given to the Lord of men, and good qualities, to strike the nation's finest proverbs in ensuring lost and lost of women and children, to be shown to us humanity in its finest form, and the best analyzed, and I hope God help And guidance and Rashad
An analytical model in the form of a hyperbolic function has been suggested for the axial potential distribution of an electrostatic einzel lens. With the aid of this hyperbolic model the relative optical parameters have been computed and investigated in detail as a function of the electrodes voltage ratio for various trajectories of an accelerated charged-particles beam. The electrodes voltage ratio covered a wide range where the lens may be operated at accelerating and decelerating modes. The results have shown that the proposed hyperbolic field has the advantages of producing low aberrations under various magnification conditions and operational modes. The electrodes profile and their three-dimensional diagram have been determined whi
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More