Objective(s): current study aims to find the effect of electronic games on children's behavior, and find the
relationship between child demographic data and the effect of electronic games on the child's behavior.
Methodology: A descriptive-analytic study was conducted for assessing the Effect of electronic games on
children's behaviors that attending to teaching hospitals in Baghdad city during the period of (October/ 20th
/2017 to March/1st /2018). A (50) purposive (non- probabilistic) sample from: Child Protection teaching
Hospital, Child Central Hospital in AL-Iskan. The sample is selected according to the criteria: Children who
visited the consulting unit of children in the hospitals in the first visit, children in
A solar updraft tower power plant (solar tower) is a solar thermal power plant that utilizes a combination of solar
air collector and central updraft tube to generate an induced convective flow which drives pressure staged turbines to generate electricity.
This paper presents practical results of a prototype of a solar chimney with thermal mass, where the glass surface is replaced by transparence plastic cover. The study focused on chimney's basements kind effect on collected air temperatures. Three basements were used: concrete, black concrete and black pebbles basements. The study was conducted in Baghdad from August to November 2009.
The results show that the best chimney efficiency attaine
... Show MoreTin Selenide (SnSe) Nano crystalline thin films of thickness 400±20 nm were deposited on glass substrate by thermal evaporation technique at R.T under a vacuum of ∼ 2 × 10− 5 mbar to study the effect of annealing temperatures (as-deposited, 100, 150 and 200) °C on its structural, surface morphology and optical properties. The films structure was characterized using X-ray diffraction (XRD) which showed that all the films have polycrystalline in nature and orthorhombic structure, with the preferred orientation along the (111) plane. These films was synthesized of very fine crystallites size of (14.8-24.5) nm, the effect of annealing temperatures on the cell parameters, crystallite size and dislocation density were observed.
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreBackground. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreIn this research, porous silicon (PS) prepared by anodization etching on surface of single crystalline p-type Si wafer, then Gold nanoparticle (AuNPs) prepared by pulsed laser ablation in liquid. NPs deposited on PS layer by drop casting. The morphology of PS, AuNPs and AuNPs/PS samples were examined by AFM. The crystallization of this sample was characterized by X-ray diffraction (XRD). The electrical properties and sensitivity to CO2 gas were investigated to Al/AuNPs/PS/c-Si/Al, we found that AuNPs plays crucial role to enhance this properties.