the researchers pointed that the poet relied on several means in the form of poetic images, including analogy, and the metaphor with its various elements, The chromatic component has also been used in the formation of its poetic image,and resorted to the correspondence of the senses and the symbol of two types:Self-code, public code : And we find a variety of symbolic stems from different sources, from these symbols, what is religious, including what is historical and what is legendary, and such symbols, which resorted to the rare places of his poems confined to the myths contained in the Bible, His use of the general symbols was ineffective in the poetic picture, relying on the metaphor and metaphor.
The breakfast key components of good nutrition and a large proportion of pupils to Ataatnol her breakfast at home and increase the failure rate breakfast increase the child's age research aims to study the importance of breakfast and emphasize the need to contain aggregates of basic food and its relationship to the curriculum daily diet and its impact on the balance of proteins, fats in food daily as well as the effect of some relevant factors such as the mother's level of education and the number of family members and summarized the most important results in that the percentage of 15.6% Neglected children eating breakfast as well as afternoon that Almaah percentages of calories coming from protein and fat at breakfast .....
The studied succession is deposited during late Berriasian-Aptian interval, which is represented by the Zubair, Ratawi, Yamama formations. The present study includes stratigraphic development and basin analysis for 21 boreholes (Rachi-1, 2; Rifaei-1, Diwan- 1; Ratawi-1, 2; Halfaia-5; West Qurna 12, 15; Nahr Umr-7,8; Zubair-47,49; North Rumaila- 72, 131, 158; Suba-7; Majnoon-2, 3 and Luhais-2, 12) distributed within 13 oil fields in the southern Iraq. The back-stripping process determined the original direction of basin depocenter for the studied succession. The Yamama basin in the study area stretches from southeast to southwest with single depocenters, it was located in the southeast of the study area near wells Mj-2, Mj-3.NR-8 and
... Show MoreMedication safety and effectiveness can be improved through interprofessional collaboration. The goals of this study were to measure the degree of physician–pharmacist collaboration within Iraqi governmental healthcare settings and to investigate factors influencing this collaboration.
This cross-sectional study was conducted in Al-Najaf Province using the Collaborative Working Relationship Model and Physician–Pharmacist Collaborative Instrument (PPCI). Four phar
Background: Nicotine is the foremost chemical constituent responsible for addiction in tobacco products, in the non-ionized condition can be easily absorbed via epithelial tissue of the lung, the mouth, the nose and across the skin
Objective:The study examines the harmful effect of the nicotine which is an important component of cigarette in vitro.
Type of the study: Cross-sectional study.
Methods: Examines the harmful effect of the nicotine which is an important component of cigarette in vitro by using two types of lung cancer cell lines (H460 TP53+/+, H441 TP53-/-).
Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreOsteoarthritis (OA) is the most common degenerative joint disorder that ultimately results in the progressive destruction of articular cartilage. The occurrence of knee osteoarthritis (OA) increases with obesity and is more common in women compared with men. Thirty patients (20 females, 10 males) clinically diagnosed with knee OA admitted to Baghdad teaching hospital between January 2015-June 2015. Patients between 35-70 year of age and 30 healthy subject (20 females, 10 males) ages matched. The results showed that increased body mass index (BMI) is a well-recognized risk factor for knee osteoarthritis, and the effect of obesity is a stronger predictor of developing knee OA symptoms in women than men. There was also a significant diffe
... Show More