Breast tumors patients generally have more oxidative stress than normal females. This was clear from a highly significant elevation (P<0.05) in malondialdehyde level in RBCs, serum and tissue of all patients groups with breast cancer as compared with control group. In this study we had found that free radicals in malignant breast tumors were higher than benign tumors, therefore the MDA might be used as a marker for prognosis of the disease.
Background: Pneumonia is the common lower respiratory tract infection among pediatrics, especially under five; it is a common cause of under-five children morbidity and mortality. Objectives of study: To identify nurses' perceptions toward therapeutic strategies for children with pneumonia and to find the association between their perceptions and their demographic variables. Methods: A Convenient sample of 46 nurses in Baghdad city from three hospitals) Kadhimiya Hospital for Children, Central Teaching Hospital of Pediatrics, and Child Welfare Teaching Hospital) included in the study to identify their perceptions regarding pneumonia in children. Results: The results of the study present that most of the nurses' participants in the a
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MorePeople are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show MoreThe adsorption of fexofenadine drug by activated charcoal powder impregnated with hydrogen peroxide (IAC) to improve its surface properties was investigated. The investigation also aimed to assess the effect of the repeated dose in increasing the amount of the drug adsorbed. The powder activated charcoal was impregnated with H2O2 3%. The effects of pH of the solution, concentration of the drug and time of the reaction parameters were investigated by using UV-Vis spectroscopy. The IAC was brought in contact with the drug solution in different pH (2, 4, 7 and 9), drug concentrations (30, 60, 90 and 120 µg ml-1) and time (15, 30, 45 and 60 minutes). After each experiment, a repeated dose of IAC was introd
... Show MoreThe main objective of this study is to describe the preparation of topographic maps using the Surfer software. A total of 159 regularly distributed Ground Control Points (GCPs) were collected with the use of the Differential Global Positioning System (DGPS). Seven methods (Contour Map, Post Map, 3D Surface Map, 3D Wireframe Maps, Grid Vector-1 Map, Color Relief Map, and Shaded Relief Maps) at the Surfer environment were used to prepare the topographic maps at the Mukhtar Village near the Al-Fallujah City. Contour lines with other features were superimposed on the DEM layer, which refers to the topography of the terrain inside this study area. The accuracy of the database's results was estimated, essential maps were given, and the re
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Graphene (Gr) decorated with silver nanoparticles (Ag NPs) were used to fabricate a wideband range photodetector. Silicon (Si) and porous silicon (PS) were used as a substrate to deposit Gr /Ag NPs by drop-casting technique. Silver nanoparticles (Ag NPs) were prepared using the chemical method. As well as the dispersion of silver NPs is achieved by a simple chemistry process on the surface of Gr.
The optical, structure and electrical characteristics of AgNPs and Gr decorated with Ag NPs were characterized by ultraviolet-visible spectroscopy (UV-Vis), x-ray diffraction (XRD). The X-ray diffraction (XRD) spectrum of Ag NPs exhibited 2θ values (38.1o, 44.3 o, 64.5 o and 77.7
... Show MoreHand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show MoreThe aim of the current research is to know the degree to which middle school teachers and female teachers in the southern border schools use electronic educational alternatives in the field of education from their point of view and its relationship to some variables, and to achieve this goal, a random sample of (200) teachers was selected in southern border schools, and a questionnaire was prepared to collect The data, as well as the descriptive approach was used to achieve this goal. T-test and analysis of variance were used for the statistical treatment. The results concluded that the educational courses provided to male and female teachers are not sufficient. It has also been concluded that the use of electronic educational alternativ
... Show More