The research dealt with a comparative study between some semi-parametric estimation methods to the Partial linear Single Index Model using simulation. There are two approaches to model estimation two-stage procedure and MADE to estimate this model. Simulations were used to study the finite sample performance of estimating methods based on different Single Index models, error variances, and different sample sizes , and the mean average squared errors were used as a comparison criterion between the methods were used. The results showed a preference for the two-stage procedure depending on all the cases that were used
Background: In recent years, the immediate loading of dental implants has become more accepted as a standard protocol for the treatment of the edentulous area. Success in implant dentistry depends on several parameters that may improve phenomenon of osseointegration and new bone formation in close contact with the implant. The aim of study was to evaluate the effect of strontium chloride coating of screw shape commercially pure titanium dental implant osseointegration at bone - implant interface by histomorphometric analysis and compare with hydroxyapatite coating at 2 time periods (2 weeks and 6 weeks). Materials and methods: Electrophoretic Deposition Technique (EPD) was used to obtain a uniform coating layer on commercially pure titanium
... Show MoreWhen a vehicle is left parked in the sun for an extended period, the gathered heat causes damage to several interiors within the cabin and causes discomfort for people and animals left inside the car. In the present work, the effect of the orientation of a parked white minibus on temperature distribution and cooling load calculation is studied experimentally in an open environment. Two different cases were studied facing south and facing east. For several hours, the temperature inside the car cabin had been monitored and measured at five separate locations. The cooling load calculations are carried out based on the experimental measurements. The results show that the overheating of parked cars always happens as a result
... Show MoreThis study focuses on diagnosis of Candida species causing Vulvovaginal Candidiasis using phenotype and genotype analyzing methods, and frequencies of candida species also using Vulvovaginal Candidiasis patients. 130 samples (100 from patients and 30 from non infected women) were collected and cultured on biological media. Identifying the yeasts, initially some phenotypic experiments were carried out such as germ tube, from motion of pseudohyphae and clamydospores in CMA+TW80 medium, API20 candida and CHROMagar Candida. Genomic DNA of all species were extracted and analyzed with PCR and subsequent Polymerase Chain Reaction - Restriction Fragments Length Polymorphism (PCR-RFLP) methods. Frequency of C. albicans, C. krusei, C. tropicalis , C.
... Show MoreThis study aims at defining the concept of the fragile state, a term that came into existence in 2014, when the states that had internal Problems and external interventions were referred to as the failure states. However, the indicators for their designation and the criteria adopted are 12 indicators that address all aspects of the State’s duties vis-a-vis its citizens. The study examined the reasons that led to the continuation of Iraq within the fragile states, and the selection of the five years within the time limits of the study due to the factors that led to the decline of Iraq and falling back within the most fragile countries. The study dealt with the fragile state challenges to the media reality as a result of the change of it
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreAbstract Organic compounds with pyrazole cores have a variety of uses, notably in the pharmaceutical and agrochemical sectors. The interest in creating pyrazole compounds, examining their many features, and looking for potential uses is growing. Our work has concert with synthesis of chalcones and pyrazolines, then finally pyrazoline-aniline derivatives and evaluation their anti-inflammatory, antibacterial and antifungal activities
The aim of this work is to shed light on the importance of medicinal plants, especially those that have extracts that have a direct effect on human health. The study and identification of botany is necessary because human life has become closely linked to the life of plants as food. In addition to using plants as food, primitive man did not stop at this point, but rather developed their use to hunt prey and also used toxic plant materials in wars. With the passage of time, the ancient man was able to link the wild plants that cover the surface of the earth and the diseases that afflict him, so he used these plants or Parts of it are for treatment. A medicinal plant is defined as one or more of its parts that contain one or more chemicals in
... Show MoreIn this study, functional and numerical response tests, which are important components in the selection of biological control agent, were carried out. In functional response trials, the amount of food consumed, attack rate (a) and handling time (Th) were calculated for each developmental period, depending on the number of preys given after 24 hours. The obtained results were evaluated with the Holling. In numerical response experiments, the development of the predator insect was examined depending on the number of preys given in certain numbers (5, 10, 20, 40 and 80) and the data were recorded. This phase of the trials continued until the individuals died. At this stage of the trials, the reproductive response of the p
... Show MoreIn this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.