This research includes depositionof thin film of semiconductor, CdSe by vaccum evaporation on conductor polymers substrate to the poly aniline where, the polymer deposition on the glass substrats by polymerization oxidation tests polymeric films and studied the structural and optical properties through it,s IR and UV-Vis , XRD addition to thin film CdSe, on of the glass substrate and on the substrate of polymer poly-aniline and when XRD tests was observed to improve the properties of synthetic tests as well as the semiconductor Hall effect proved to improve the electrical properties significantly
The aim of this research is to measure the effect of Adey- Shire model in the achievement and critical thinking of first intermediate female students in mathematics. The researcher adopted the experimental method with a post-test, the research of sample consists of (60) female students, divided into two groups with (30) students in the experimental group, that studied with Adey- Shire model, and (30) students in the control group who studied in the usual way. The two groups are equivalent in many variables. The researcher makes two tests of multiple choices, the first one is an achievement test consists (30) items and another test was for a critical thinking test with (25) items. The statistical analysis make to both tests is made with s
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreSimulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show MoreThe study deals with China's soft power and diplomacy in the Middle East, and it focuses specifically on the tools and foundations of China's soft diplomacy and how it achieves its goals in the region in addition to its challenges in the region. In this regard, the study also focuses on the Chinese Belt and Road Initiative and its soft foundations and how they serve China’s diplomacy and soft power in the region. The study ends with a set of conclusions, perhaps the most prominent of which is that diplomacy and soft power have become a fundamental pillar of China's foreign policy to achieve its foreign goals and to establish an international system compatible with China's principles. As for the Middle East, China has established a poli
... Show MoreThis research highlights one of the most important issues that have been controversial between Islamic schools, which is the duality of Intellect and Revelation and the nature of their relationship, in two core points:
The first point: Could there be a real conflict between Intellect and revelation? While the school of hadith view that this assumption is a rational assumption that does not real as long as the revelation is correct and the Intellect is clear, and that what is claimed are due to other Intellect s, we find that the Ash’ari school adopts the saying that the real conflict may occur, but rather confirms its occurrence.
The second point: For whom is the priority, for the Intellect or th
... Show MoreBackground:Oriental sore occurs mostly in the
mediteranian region , North Africa ,and the Middle East .
Rodents are the main reservoir for the parasite . The wet
type caused by L. major is rural and the dry type caused by
L. tropica is urban and humans are presumably the only
reservoir. Sand fly vectors are involved in all forms.
Objectives: This study aimed to show the most
important bacterial infections concomitant with cutaneous
leishmaniasis .
Methods; The study was performed on 75 patients (ages
1-50 years ) from both sexes were attending Skin Diseases
Department of Ramadi General Hospital during the period
extended from January to June 2000. These patients were
clinically diagnosed as patients
Background: Coronavirus pandemic (COVID-19) has enormously affected various healthcare services including the one of community pharmacy. The ramifications of these effects on Iraqi community pharmacies and the measures they have taken to tackle the spread of COVID-19 is yet to be explored. In this cross sectional survey, infection control measures by community pharmacies in Sulaimani city/Iraq has been investigated.
Methods: Community pharmacists were randomly allocated to participate in a cross-sectional survey via visiting their pharmacies and filling up the questionnaire form.
Results and discussion:
... Show MoreBackground: Bowel preparation prior to
colonic surgery usually includes antibiotic
therapy together with mechanical bowel
preparation which may cause discomfort to the
patients, prolonged hospitalization and water
& electrolyte imbalance.
Objective: to assess whether elective colon
and rectal surgery may be safely performed
without preoperative mechanical bowel
preparation.
Method: the study includes all patients who
had elective large bowel resection at Medical
City – Baghdad Teaching Hospital between
Feb, 2007 to Jan, 2010. Emergency operations
were not included. The patients were randomly
assigned to the 2 study groups (with or without
mechanical bowel preparation.
Results: A to
The theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show More