An immunological technique was investigated for the detection of human semen in forensic analysis.This technique included a preparation of anti-human seminal plasma antibodies, by immunizing rabbits with treated human semen. The human semen was treated with an acid to prevent cross reactivity with other human body fluids. The antibody produced was tested against different animal,s seminal fluid samples (dog, goat ,sheep, cow) and human body fluids( saliva, blood , vaginal fluid, ear wax and human semen). It was found that using this developed technique was only selectively responsed with human semen . The prepered kit was evaluated and tested in Forensic laboratory- Ministry of Health. Finally, results were obtained in a comparison with the recommended techniques.
This research aims to determine the role of employee performance evaluation of the achievement of the quality of human resources in the Office of the Inspector General / Martyrs Foundation requirements by employing comparison steps reference with the Office of the Inspector General / Ministry of Higher Education and Scientific Research, has been touching the researchers need the Office of the Inspector General / Martyrs Foundation to apply assess the performance is good for workers and the employment of its outputs to achieve the requirements of the above-mentioned system, and in order to stand on this role we raised the following question President: (is the quality of human resources requirements are achieved through the employm
... Show MoreAbstract
The research aims to determine the role of the efficiency of Human Resources Information System in the effectiveness of Employees Performance Appraisal System in the Ministry of Higher Education and Scientific Research / Center for the ministry, it was touching the researchers need the ministry to devise methods that employ outputs Human Resources Information System in the organization surveyed for the development of methods and levels of process evaluate the performance of its employees, in order to identify the extent of the role played by human resources information system in the process of assessing the performance of employees, we raised the question of the President as follows:
... Show MoreThe contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te
... Show MoreThe aim of this study was to evaluate the effects of local application of bisphosphonate gel and recombinant human bone morphogenic protein 2 gel, on titanium dental implant stability and marginal bone level. Twenty-seven patients with upper and lower missing posterior tooth/teeth were included in the study with a total of 71 implants that were used for rehabilitation. The implants were randomly divided into 4 groups: 3 study groups and 1 control. Group1; local application of bisphosphonate gel, group 2; local application of recombinant human bone morphogenic protein 2 gel, group 3; local application of a mixed formula of both gels. The gel application was immediately preimplant insertion, group 4; implant insertion without application of a
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More