The adequacy of diagnostic tests, together with trichomoniasis associated clinical symptoms, were investigated in females suffering vaginitis, and they were referred to the Gynecology Department, Al-Yarmouk Teaching Hospital during the period December 2004 – June 2005. The total number of patients was 250 cases (age range: 18 - 52 years), and each patient was examined using a sterile speculum to obtain vaginal swabs for examination. The diagnosis with T. vaginalis was done in many methods. The direct methods included wet and stained (Leishman's stain) examinations and cultivation in different culture media (Kupferberg Trichomonas Broth Base;, Trichomonas Agar Base; TAB and Trichomonas Modified CPLM), while the indirect methods were serol
... Show MoreThe Isolated Combustion and Diluted Expansion (ICADE) internal combustion engine cycle combines the advantages of constant volume combustion of the Otto cycle with the high compression ratio of the Diesel cycle. This work studies the effect of isolated air mass (charge stratification) on the efficiency of the cycle; the analysis shows that the decrease of isolated air mass will increase the efficiency of the cycle and the large dilution air mass will quench all NOx forming reactions and reduce unburned hydrocarbons. Furthermore, the effect of Fuel / Air ratio on the efficiency shows that the increase of Fuel / Air ratio will increase efficiency of the cycle.
Proverbs are considered as a major source of ancient events and happenings. Similar to other past events related to life, proverbs have many important and famous values in people's life. This study will shed lights on the use of proverbs as short sentences based on long experiences. The aim of the study is to explicate the roles, and the importance of proverbs in our life and how they are used to convey thoughts to people throughout simple words with denotation. Thus, proverbs explicate the truth and experience of our grandfathers when directed for criticism. Few proverbs were used by writers to criticize, mimic and reprint their personalities. Hence, proverbs will achieve portions of the unique roles of understanding. The model to
... Show MoreDue to the difficulties that Iraqi students face when writing in the English language, this preliminary study aimed to improve students' writing skills by using online platforms remotely. Sixty first-year students from Al-Furat Al–Awsat Technical University participated in this study. Through these platforms, the researchers relied on stimuli, such as images, icons, and short titles to allow for deeper and more accurate participations. Data were collected through corrections, observations, and feedback from the researchers and peers. In addition, two pre and post-tests were conducted. The quantitative data were analysed by SPSS statistical Editor, whereas the qualitative data were analyzed using the Piot table, an Excel sheet. The resu
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More