The recurrent somatic variations in
The aim of the study was to detect the frequency of R132 mutations in the
The recurrent somatic variations in
The aim of the study was to detect the frequency of R132 mutations in the
Objective :To evaluate elderly's environmental practices concerning fall prevention at governmental elderly care homes in Baghdad city. Methodology: A quazi- Experimental study was carried out in governmental elderly care homes at Baghdad city, during the period 1st, June 2014 to 30th November, 2014 , selected a purposive " Non – probability " sample of (40) elderly men and women aged (60) years old and over who were resident in governmental elderly care homes " Al Ceelakh and Al Sader elderly care homes", the data was collected through the use of constructed questionnaire that consist of (23) items,
The research aims to identify the bedroom furniture designs for children who are in ages range between (4-6) years and the rate of employing them in developing their aesthetic sense. To achieve this objective, the researchers developed the two research tools represented by a analysis-description form of bedroom furniture designs included a number of domains that were represented in the shapes, colors, and sizes of the furniture, as well as the availability of the safety factor, ease of use, cleaning and movement. As for the aesthetic sense scale included (30) paragraphs and alternatives (always, sometimes, never), they were distributed among a representative sample of (170) mothers of children were chosen randomly from (17) kindergartens
... Show MoreThe research seeks to identify the dimensions of creative thinking and its impact on the re-engineering of hotel service operations by analyzing the correlation and impact between research variables as well as comparing the research sample The importance of the research comes from the need to motivate managers the importance of creative thinking among workers in the researched hotels because it is an essential part in the re-engineering of hotel services. To achieve this a questionnaire was designed containing (33) items that include the independent research variables (creative thinking) and the accredited (re-engineering the hotel service) and distributed to a sample of (50) individuals represented by (Commissioner Director, Dep
... Show MoreTo evaluate the efficiency and effectiveness of three minimally invasive (MI) techniques in removing deep dentin carious lesions. Forty extracted carious molars were treated by conventional rotary excavation (control), chemomechanical caries removal agent (Brix 3000), ultrasonic abrasion (WOODPECKER, GUILIN, China); and Er, Cr: YSGG laser ablation (BIOLASE San Clemente, CA, USA). The assessments include; the excavation time, DIAGNOdent pen, Raman spectroscopy, Vickers microhardness, and scanning electron microscope combined with energy dispersive X-ray spectroscopy (SEM–EDX). The rotary method recorded the shortest excavation time (p < 0.001), Brix 3000 gel was the slowest. DIAGNOdent pen va
In light of the rapid changes in the business environment and the entry of administrative leaders in the challenges of the atheist and twenty- increasing competition between sectors and the desire to acquire the skills, the traditional methods are no longer viable, which requires doing evaluates performance according to a more holistic, rather than limiting the performance evaluation on the financial hub that has not longer enough alone, as well as benchmarking method that has proven successful in developed countries as a way to develop and improve products and services.
I've touched your search to the development of indicators evaluating the performance and preparation of a mechanism for making comparisons of reference between o
... Show MoreJournal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology
My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show MoreObjective: To assess the effect of education program on psychological and social changes of secondary school teachers with menopause.
Method: A quasi-experimental design is carried out with the application of a pre- post –test for menopause secondary school teacher's bio-psychosocial changes. Non-probability sample consists of (60 female teachers) (40) teachers from Al- Rusafa first Education Directorate secondary schools, and (20) teachers from Al- Karkh third Education Directorate secondary schools. The sample was exposed to pretest, educational program, and posttest. Data were collected through the utilization of the study instrument (the questionnaire) and application of bio-psychosocial ed
... Show MoreVehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina
... Show More