ATAW Eqbal Abdul Ameer'. Shifaa Jameel Ibrahim?, HISTORY Of MEDICINE, 2023
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreThe game of futsal requires physical and motor abilities in order to perform it, as these abilities play a fundamental role in making the player have a wonderful physical level and be able to implement the skill aspect of futsal football, especially the scoring skill, which is the subject of the study. The importance of the research lies in arriving at knowledge of the percentage The contribution of some physical and motor abilities to the performance of the scoring skill in indoor soccer, in order to reach final scientific results that serve researchers, coaches, and players alike. The research aims to identify the most important physical and motor abilities of young players in futsal football, and to identify the percentage of contributio
... Show MoreAim: This study aimed to investigate the impact of rabbit serum on skin wound healing with the help of histological examination. Materials and Methods: A total of ten indigenous rabbits were used in this study. The animals were divided into two groups: control and serum- treated. The histological assessment was done with a paraffin embedding technique and the histological sections were stained with H&E stain. Results: Severe infiltration of polymorphonuclear leukocytes with severe fibrin deposits were seen in serum treated group at 2 days post-injury; at 7 days post-injury the changes revealed moderate fibroplasia, fibrin deposit and severe infiltration of both mononuclear and polymorphonuclear leukocytes; at 14 days post-inju
... Show MoreBackground: Ejection fraction have been used frequently
for assessment of the left ventricular function, but can be
associated with errors in which myocardial performance
index have been used as another parameter to measure the
left ventricular function.
Objective: selecting another echocardiography parameter
for the assessment of myocardial in function instead of the
ejection fraction.
Methods: 160 patients referred to the echocardiogram unit
from the period december 2007 to august 2008 requesting
assessment of left ventricular function. After clinical
examination, routine blood tests; chest x-ray and
electrocardiographic recording have been completed. All
patients informed to come for this unit af
Abstract Objective: To assess nurses' beliefs toward reporting suspected child abuse. To achieve the objectives of the study a questionnaire of child abuse was used. Methodology:- The sample of the study consist of (224) registered nurses who were employed in general hospitals, pediatric hospitals, National psychiatry and mental illness center, nursing colleges, nursing schools. Data were collected from 20 April 2004 to 20 June 2004.Data were analyzed through the application of descriptive statistical analysis. Percentage frequency and mean and inferential data analysis ANOVA. Results: - The result of t
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
New Fe(II),Co(II),Ni(II),Cu(II) and Zn(II) Schiff base complexes which have the molar ratio 2:1 metal to ligand of the general formula [M2( L) X4] (where L=bis(2-methyl furfuraldene)-4-4`-methylene bis(cyclo-hexylamine) ) were prepared by the reaction of the metal salts with the ligand of Schiff base derived from the condensation of 2:1 molar ratio of 2-acetyl furan and 4-4`-methylene bis (cyclohexylamine). The complexes were characterized by elemental analysis using atomic absorption spectrophotometer ,molar conductance measurements, infrared, electronic spectra,and magnetic susceptibility measurement. These studies revealed binuclear omplexes. The metal(II) ion in these complexes have four coordination sites giving the most ex
... Show MoreIn this research the specific activity of natural radionuclides 226Ra, 232Th and 40K were determined by sodium iodide enhanced by thallium NaI(TI) detector and assessed the annual effective dose in Dielac 1 and 2 and Nactalia 1 and 2 for children of less than 1 year which are available in Baghdad markets. The specific activity of 40K has the greater value in all the types which is in the range of allowed levels globally that suggested by UNSCEAR. The mean value of annual effective doses were 2.92, 4.005 and 1.6325 mSv/y for 226Ra, 232Th and 40K respectively.