Modern communication and media technology has pioneered new horizons and curried out deep changes in the various fields of social life, It effected enormously human communication as well.
Content one Who late the developments which have effected the social relations ،due to the new media ،especially Face book ,will certainly notice the far cry changes of the social relation net which has been effected ,in a way or another ،the accelerated development ،under the appearance of the so called the virtual society .
Face book has embodied the means – communication ,which has become an important turn point in the social communication .
It is the point the present paper tries to expose an discuss by a field study curried on a sam
The marketing of banking service is considered to be one of the impotent fields which showed a universal inebriates . He research showed the comparison between the application of marketing in ideas and application for loot government and private Iraqi bank. The research comets of four parts; Mythology / the concept and the importance of Banking Marketing / Research applichlion/ Conelnion and recommendation.
Background:Amino acid disorders are a major group of inborn error metabolism (IEM) with variable clinical presentation; its diagnosis constitutes a real challenge in a community with high consanguinity rate and no systematic newborn screening.
Objectives: to provide data about amino acid disorders detected in high-risk Iraqi children by using quantitative amino acid fluorescent high performance liquid chromatography (HPLC) analysis.
Type of the study: Cross-sectional study.
Methods: a descriptive cross sectional study from 1st February to 1st December 2014, at Neurological ward and clinic of the Children Welfare teaching Hospital, in Baghdad - Ira
... Show MoreLong-term use of non-steroidal anti-inflammatory drugs (NSAIDs) mostly associated with renal and hepatic adverse effects, and the adjunct use of compounds with potent protective effects, like silymarin, may be one of the choices to avoid these effects. This project was designed to evaluate the protective effect of silymarin against the suspected renal and hepatic injury induced with long term use of NSAIDs; 220 patients with osteoarthritis were randomized into 5 groups and treated with either silymarin 300mg/day alone, piroxicam 20mg/day alone, meloxicam 15mg/day alone or the combination of each of them with silymarin for 8 weeks. The renal and hepatic functions were evaluated before starting treatment and after 8 weeks including assessm
... Show MoreOne of the most important challenges facing project management at present time is to ensure project accomplishment in spite of the specific restrictions like the specific time the financial resources specialized to do the project ; which require an accurate consideration for time and cost . the modern village project (residential building aspect) is one of the great project that ministry of agriculture is trying to do Wasit governorate it is chosen as the work in this project is dilatory for that is being studied in term of some modern mathematical and scientific methods like critical path method (CPM)which is one of the project management and scheduling methods to know the time needed to accomplish residential building pro
... Show MoreBackground: Fifteen percent of small for gestational age are small as a result of fetal growth restriction, which could be due to maternal, placental or fetal factors. It is an important clinical problem associated with increase perinatal mortality and morbidity. Leptin is a protein that produced by many tissues including the placenta (syncytiotropholoast). Dysregulation of leptin metabolism may be implicated in preeclampsia and IUGR pathogenesis.
Aim of the study: To study the trend of leptin level alteration in maternal serum and cord blood in pregnancies complicated by fetal growth restriction and its relation with fetal outcome.
Methods: An Analytic, cross- sectional study conducted in Al-Elwyia Maternity Teaching Hospital and
In this work ,the modified williamos-Hall method was used to analysis the x-ray diffraction lines for powder of magnesium oxide nanoparticles (Mgo) .and for diffraction lines (111),(200),(220),(311) and (222).where by used special programs such as origin pro Lab and Get Data Graph ,to calculate the Full width at half maximum (FWHM) and integral breadth (B) to calculate the area under the curve for each of the lines of diffraction .After that , by using modified Williamson –Hall equations to determin the values of crystallite size (D),lattice strain (ε),stress( σ ) and energy (U) , where was the results are , D=17.639 nm ,ε =0.002205 , σ=0.517 and U=0.000678 respectively. And then using the scherrer method can by calculated the crystal
... Show MorePanax ginseng (PG), one of the most widely used herbal medicines, has demonstrated various beneficial effects such as anti-inflammatory, antioxidant, and anticancer impacts. Naturally occurring ginsenosides in the ginseng plant inhibit cell proliferation and significantly reduce liver damage induced by certain chemicals. Aflatoxin B1 (AFB1) is a primary mycotoxin due to its hepatotoxic, immunotoxic, and oncogenic effects in animal models and humans. In this study, we examined the effects of assorted doses of PG aqueous crude extract on the expression of matrix metalloproteinase 1 and 7 (MMP-1 and MMP-7) in the kidney, spleen, and liver of experimental AFB1-exposed mice, using immunohistochemistry (IHC). Mice were orally administered
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the