This study aimed to assess orthodontic postgraduate students’ use of social media during the COVID-19 lockdown. Ninety-four postgraduate students (67 master’s students and 27 doctoral students) were enrolled in the study and asked to fill in an online questionnaire by answering questions regarding their use of social media during the COVID-19 lockdown. The frequency distributions and percentages were calculated using SPSS software. The results showed that 99% of the students used social media. The most frequently used type of social media was Facebook, 94%, followed by YouTube, 78%, and Instagram, 65%, while Twitter and Linkedin were used less, and no one used Blogger. About 63% of the students used elements of social media to l
... Show MoreThe research aims to measure the effect of sensory marketing (visual marketing, audio marketing, olfactory marketing, taste marketing, tactile marketing) in enhancing customer loyalty (behavioral loyalty, situational loyalty, perceptual loyalty) and the mediating role of marketing knowledge (product knowledge, price knowledge, promotion knowledge knowledge of distribution, knowledge of employees, knowledge of physical evidence, knowledge of the process) in a group of large single market markets in Baghdad and the researcher chose it because of the challenges faced by large single market in satisfying the customer and maintaining it as a permanent visitor and enhancing his loyalty, and the research problem was identified with a main
... Show MoreIn this study, the genus Xylocopa Latreille, 1802 (Hymenoptera: Apidae) was revised. There were 4 species registered in our investigations: X. hottentotta Smith, 1854; X. olivieri Lepeletier, 1841; X. pubescens Spinola, 1838 and X. valga Gerstäcker, 1872, the first species was described as being found for the first time for the insect fauna of Iraq, which were obtained from Solanum melogena L. flowers. Key to the species was constructed and supported by figures of the main diagnostic characters and some morphological features, illustrated and compared with other species, which are recorded in the current survey.
<p> Traditionally, wireless networks and optical fiber Networks are independent of each other. Wireless networks are designed to meet specific service requirements, while dealing with weak physical transmission, and maximize system resources to ensure cost effectiveness and satisfaction for the end user. In optical fiber networks, on the other hand, search efforts instead concentrated on simple low-cost, future-proofness against inheritance and high services and applications through optical transparency. The ultimate goal of providing access to information when needed, was considered significantly. Whatever form it is required, not only increases the requirement sees technology convergence of wireless and optical networks but
... Show MoreThe density functional B3LYP is used to investigate the effect of decorating the silver (Ag) atom on the sensing capability of an AlN nanotube (AlN-NT) in detecting thiophosgene (TP). There is a weak interaction between the pristine AlN-NT and TP with the sensing response (SR) of approximately 9.4. Decoration of the Ag atom into the structure of AlN-NT causes the adsorption energy of TP to decrease from − 6.2 to − 22.5 kcal/mol. Also, the corresponding SR increases significantly to 100.5. Moreover, the recovery time when TP is desorbed from the surface of the Ag-decorated AlN-NT (Ag@AlN-NT) is short, i.e., 24.9 s. The results show that Ag@AlN-NT can selectively detect TP among other gases, such as N2, O2, CO2, CO, and H2O.
Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreA new species, Hottentotta pooyani sp. nov. is described and illustrated using two female specimens collected from the Khuzestan Province in Iran. This species is compared with the closely species including H. khoozestanus Navidpour, Kovařík, Soleglad & Fet, 2008; H. pellucidus Lowe, 2010 and H. saxinatans Lowe, 2010 that were previously described in Iran and Oman.
In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
The official spokesperson considered responsible for the transmission of information and communication messages that convey the government’s view on the various political and economic issues that affect the public opinion towards the performance achieved by the various governmental institutions and for the purpose of communicating with the media in a positive and effective manner, a number of institutions in the world in general and in Iraq in particular have nominated a spokesman to coordinate the efforts and the dissemination of news and the preparation of press conferences to contribute to the achievement of a positive and effective level between the government and the media, so this study has tackled to deal with the credibility of
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More