Concentrations of uranium were measured in this study for twenty soil samples from four areas with different depths (soil surface-20-40-60-80)cm .The study regions include Missan Governorate (Al-Iskan area,Al-Shibbana area ,Hai-Al Moualimin Al Jadied area ,Sector 30 area). The Uranium concentrations in soil samples measured by using fission tracks registration in (CR-39) track detector that caused by the bombardment of (U-283) with thermal neutrons from (241Am-Be) neutron source that has flux neutron thermal of (5 ×103 n cm-2 s-1). The concentrations values were calculated by a comparison with standard samples. Through out the result, it was found that averages of uranium concentrations in soil samples were as the following : Al - Iskan area (0.404 ± 2.765) ppm, Al - Shibbana area (0.432 ± 1.719) ppm, Hai - Al - Moualimin Al - Jadied (0.236 ± 2.320) ppm, Sector 30 area (2.158±0.631) ppm.
Objectives: To assess general social factors for elderly in geriatric homes in Jordan.
Methodology: The study was conducted for clients residing in elderly homes. A purposive sample of (155)
residents were selected. Social resource scale by (Duck University Center) called (OARA) older adult resources
and services was used as tool for data collection. The questions extract data about family structure, patterns of
friends and visiting, availability of a confident, satisfaction with the degree of social interaction and availability
of a helper in the event of illness or disability and the program of trips in the houses.
Results: The findings revealed that the life expectancy for women is greater than for men. In respect to
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Background: Bell's palsy was defined as facial weakness of lower motor neuron type caused by idiopathic facial nerve involvement outside the central nervous system without evidence of aural or more widespread neurologic disease. The cause is unclear, but the disorder occurs more commonly in diabetics.Objectives: to differentiate cases of idiopathic Bell's palsy from diabetic mononeuropathy presented with Facial nerve palsy by assessing the taste, because they differ in etiology, management & prognosis.Patients &Methods: One hundred and fifteen consecutive patients were referred for the treatment of facial palsy, from May the 5th 2012 to April 12th 2013 in Al-Kindy Teaching Hospital and The Neurosciences Hospital, in Baghdad / Ira
... Show MoreAlzheimer’s disease (AD) is a progressive disorder that affects cognitive brain functions and starts many years before its clinical manifestations. A biomarker that provides a quantitative measure of changes in the brain due to AD in the early stages would be useful for early diagnosis of AD, but this would involve dealing with large numbers of people because up to 50% of dementia sufferers do not receive formal diagnosis. Thus, there is a need for accurate, low-cost, and easy to use biomarkers that could be used to detect AD in its early stages. Potentially, electroencephalogram (EEG) based biomarkers can play a vital role in early diagnosis of AD as they can fulfill these needs. This is a cross-sectional study that aims to demon
... Show MoreThis research aims to know the reality of implementation of Knowledge Management in Saudi Universities Applied in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.
The study investigated the university staff in Shaqra, Thadig, and Huraymila branches, using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.
The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo
... Show MoreThis study was conducted on the workers of the brick kilns at Al- Nahrawan area south-east of Baghdad city to investigate the effect of the pollutant emissions (fumes and gases) released from the burned fuel in this kiln. Blood samples were taken from group individuals of workers at this brick kilns and non-working individuals as a control. The influence of these emissions on the workers' health was measured by examining certain chromosomal aberrations among the workers. These aberrations were a formation of: chromosomal rings, dicentric chromosomes, breaks arm and acentric fragments. It has been observed that most of these aberrations were found within workers of age 40 years and above, represented by formations of averages 1.50 and 1.0
... Show MoreBackground: The prevalence of obesity is continuously rising world-wide. Obesity is an important risk factor of cardiovascular disease (CVD), metabolic syndrome (MS), and type 2 diabetes (T2D).
Objective: To estimate the frequency of MS in obese versus non-obese subjects in Basrah, Iraq .
Methods: This is a prospective clinical study performed in Al-Sadr Teaching Hospital, Basrah, and included 86 obese subjects (with a BMI ≥ 30), 39 males and 47 females, and 132 non-obese subjects ( with a BMI < 30 ), 60 males and 73 females as a control group. Measurement of height, weight, waist circumference (WC), blood pressure ( BP ), fasting blood glucose ( FBG ), total cholesterol (TC), triglycerides (TG ) and high density lipoprotein-
The topic of (pilgrims) of the old and modern subjects at the same time, as it extends his foot and is associated with the beginning of speech and argument, a modern because it is based on studies and research (and the theory of pilgrims) from (Austin and Cyril) through (Charles Breman) to (Aristotle) ), It is worth mentioning here to mention the role of (Hazem al - Qartagni) in mentioning the value of the pilgrimage of hair and saying the use of persuasion in the hair, is palatable and acceptable. Hence our research applied these views, and we chose the pendants as a model for that matter.