The lipid profile and adipokines of an adolescent may be affected by some parasite infections. Recently, it has been discovered that these parasites are connected to body mass index (BMI), lipids and adipokines. The current study, therefore, aimed to specify how Toxoplasma gondii (T. gondii) affect BMI, lipid profile and adipokines. This study was conducted in Al Madain hospital, Baghdad from October to December 2022. An ELISA test was performed to examine the anti-T. gondii IgG and IgM for a group of adolescents attending the hospital. Based on this examination ninety adolescents were chosen to be involved in the study. They were separated in to two groups: individuals who tested positive for the parasite (n=45) and those who teste
... Show MoreThe recent research aims to the following
1- Identify the for Psychicasthein high school students
2-Identify the differences of Psychicasthein of high school students according tothe (male, female).
3- Identify the for Family Violence high school students .
4-Identify the differences of Family Violence of high school students according to the ( male,female)
5-Identify of the relationship between the Psychicasthein and family violence
To achieve the objectives of the present research was to build Psychicasthein scale and the adoption of a measure of domestic violence, and applied these tools, and after extracting the psychometric properties of the two measures of reliability and validity, according to a sample of 200 stu
Take the teacher's key position in the educational system as a foundation stone and primarily responsible for achieving the goals of Education , and efficient teacher conscious is the teacher who prepared educationally and specialized training well add to the enjoyment of a range of features that enable them to adjust and compatibility with educational developments
Hence the problem of the study questioning the Kindergarten Does teacher professional awareness that enable it to perform its work learned from experienceThe research sought to measure
1-Professional awareness among teacher Kindergarten
2-Professional awareness of Kindergarten parameters depending on the type of kindergarten.
Limited search parameters Riyadh govern
Background. To identify the most common retention protocols practiced by Iraqi orthodontists using a specially designed e-survey. Furthermore, this study aimed to assess the effect of sociodemographic factors on the participant’s choice. Methods. Two hundred and twenty-five questionnaires with 23 multiple choice questions were sent to members of the Iraqi Orthodontic Society. The questionnaire was organized into four sections representing information about sociodemographic status of the orthodontists, factors affecting the selection of the retention system, commonly used retainers in the upper arch and lower arch, and duration of the retention system. The chi-square test was used to test the significant association between differe
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
AW Tarik, AW Ali T, A Salah, Journal of faculity of medicine Baghdad university, 2014 - Cited by 3
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More