WA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.
Gestational diabetes mellitus (GDM) is a growing health concern that usually appears during the second and third trimester stage of pregnancy and is characterized by carbohydrate intolerance of variable severity. The aim of the present study was to scrutinize the relationship between the G972R polymorphism of the insulin receptor substrate-1 (IRS-1) gene with GDM in the Iraqi female population. One hundred and twenty of blood samples taken from healthy women (control) and women with gestational diabetes mellitus in 3rd trimester stage of pregnancy, fasting blood glucose (FBG) and HbA1c% measured to diagnose GDM, lipid profile (cholesterol, triglyceride, HDL, LDL, and VLDL), insulin concentration, insulin resistance and beta cell function to
... Show MoreMost of the literature on the management and application terkzat waved the last period on large organizations was the negligence of knowledge management in small organizations where research aims to find out knowleddge management, small projects In oxygen Ahli plant in Iraq, and the fact the role of knowledge management in small projects from the standpoint of employees in order to achieve this used production method results. The results showed that knowledge management has a role in the high level of productivity during the years 2010-2013. The results showed that knowledge management has a role in the high level of productivity during the years 2
... Show MoreMaxim Gorky’s Mother is one of the most important literary genre in social realism, in which he depicts female characters with revolutionary fervor and enthusiasm, projecting his social ideologies and dreams. Though the novel unique importance lies in the fact that it has been thoroughly analyzed by many writers, historians and sociologists, there are almost no studies devoted to the role of women out of a Marxist and feminist point of view. The present paper sheds light on the Russian woman‘s important role in overcoming all adversity and gain her position on Social Realism.
Одно из центральных мест сре
... Show More 
One hundred of dialysis patients' mean age ( 51.18±8.28) years and one hundred healthy control group , where carried out from different hospitals of Baghdad city , during the period between November /2012 until March/2013. Blood samples were collected before dialyzing for estimation the concentration of urea, creatinine, uric acid, random blood sugar , calcium and cholesterol by enzymatic method detected spectrophotometerically.
The aim of this study is to determine concentration of urea, creatinine, uric acid, RBS , calcium and cholesterol in hemodialysis patients in Baghdad . The results showed that there were highly significant increases (P<0.01) in the mean of creatinine ,
... Show MoreThis research aims to know the reality of implementation of Knowledge Management in Saudi Universities Applied in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.
The study investigated the university staff in Shaqra, Thadig, and Huraymila branches, using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.
The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo
... Show MoreThis study aimed to detect Anaplasma phagocytophilum in horses through hematological and molecular tests. The 16S rRNA gene of the Anaplasma phagocytophilum parasite was amplified by polymerase chain reaction (PCR), then sequenced, and subjected to phylogenetic analysis to explore "Equine Granulocytic Anaplasmosis" (EGA) infection in three important gathering race horses areas in Baghdad governorate, Iraq. Blood samples were obtained from 160 horses of varying ages, three breeds, and both sexes, between January and December 2021. Prevalence and risk variables for anaplasmosis were analyzed using statistical odds ratio and chi-square tests. Results demonstrated that clinical anaplasmosis symptoms comprised jaundice, wei
... Show MoreAcontaminated ophthalmic solutions represent a potential cause of avoidable ocular infection. This study aimed to determine the magnitude and pattern of microbial contamination of eye drops in out patient at the department of ophthalmology, at Baghdad national hospital, Iraq. Fifty four vials from the out patient clinic were obtained for microbial examination after an average use of 2 weeks. The dropper tip and the residual eye drop were examined for contamination. The specimens were cultured, the number of colonies counted, the organisms identified. Eight (15%) out of 54 analyzed vials were contaminated , most bacteria identi
... Show MoreNow that most of the conventional reservoirs are being depleted at a rapid pace, the focus is on unconventional reservoirs like tight gas reservoirs. Due to the heterogeneous nature and low permeability of unconventional reservoirs, they require a huge number of wells to hit all the isolated hydrocarbon zones. Infill drilling is one of the most common and effective methods of increasing the recovery, by reducing the well spacing and increasing the sweep efficiency. However, the problem with drilling such a large number of wells is the determination of the optimum location for each well that ensures minimum interference between wells, and accelerates the recovery from the field. Detail
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the