Abstract
This study is aim to :
- Put a standard to evaluate the altruistic behavior in kindergarten children.
- Know level of the altruistic behavior in the kindergarten children according to their mother "s points of view.
- Know the level of the altruistic behavior in the kindergarten children according to their teacher "s points of view.
- The differences in the level of altruistic behavior in kindergarten children between their mothers & teachers points of view.
The sample consists of (120) children of kindergarten children in Baghdad. The researcher has built a to
... Show MoreThe measurement of vitamin B1 in pure and pharmaceutical formulations was proposed by using a straightforward and sensitive spectrophotometric approach. Sulfacetamide (SFA) is diazotized, then coupled with vitamin B1 in alkaline media to produce a colored azo dye complex with a stability constant of 5.597 × 105 L/mol. The product is stable, with a maximum absorption wavelength of 489.5 nm, molar absorptivity of 10108 L/mol∙cm, Sandell's sensitivity of 0.0334 μg/cm2, detection limit of 0.0135 μg/mL, and Beer's law being observed over the concentration range of 0.2–20.0 μg/mL. The stability constant and stoichiometry of the produced azo dye were calculated using the continuous variation (Job's) and mole ratio methods. The suggested ap
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MoreIn this work, optical system with different aperture shapes (circular, square, elliptical and triangle aperture) has been used for efficiency evaluation when the system involved moving factor in ideal case (aberration free). The optical system evaluate far moving object, therefore the image forming at image plane due to point spread function (image formula of incoherently illuminated point object). A mathematical treatment has been used to getting results by Gaussian numerical calculations method. The results show priority of circular aperture when optical system that submits of moving factor.
Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreBackground: The repair of bone defects remains a major clinical orthopaedic challenge. Bone is a highly vascularised tissue reliant on the close spatial and temporal connection between blood vessels and bone cells to maintain skeletal integrity. This study aimed to study the efficacy of Panax ginseng as a osteoinducer in tibia of rat and as a stimulator for bone healing and to study the immunohistochemical expression of osteonectin as bone formation markers in experimental and control groups during bone healing. Material and method: : In this study thirty albino male rats , weighting (200-300) gram ,aged (2-3) months ,will be used under control conditions of temperature ,drinking and food consumption. The animals will subject for an
... Show MoreCopper oxide (CuO) nanoparticles were synthesized through the thermal decomposition of a copper(II) Schiff-base complex. The complex was formed by reacting cupric acetate with a Schiff base in a 2:1 metal-to-ligand ratio. The Schiff base itself was synthesized via the condensation of benzidine and 2-hydroxybenzaldehyde in the presence of glacial acetic acid. This newly synthesized symmetric Schiff base served as the ligand for the Cu(II) metal ion complex. The ligand and its complex were characterized using several spectroscopic methods, including FTIR, UV-vis, 1H-NMR, 13C-NMR, CHNS, and AAS, along with TGA, molar conductivity and magnetic susceptibility measurements. The CuO nanoparticles were produced by thermally decomposing the
... Show MoreCopper oxide (CuO) nanoparticles were synthesized through the thermal decomposition of a copper(II) Schiff-base complex. The complex was formed by reacting cupric acetate with a Schiff base in a 2:1 metal-to-ligand ratio. The Schiff base itself was synthesized via the condensation of benzidine and 2-hydroxybenzaldehyde in the presence of glacial acetic acid. This newly synthesized symmetric Schiff base served as the ligand for the Cu(II) metal ion complex. The ligand and its complex were characterized using several spectroscopic methods, including FTIR, UV-vis, 1H-NMR, 13C-NMR, CHNS, and AAS, along with TGA, molar conductivity and magnetic susceptibility measurements. The CuO nanoparticles were produced by thermally decomposing the
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show More