Anew Solar concentrator have been designed in this paper, this concentrators Were based on the total internal reflection in a prism, the prism angles has been calculated by depending on the solar incident ray angle in baghdad for a year. The optical design consist ofa triangular presume, Where the solar cells on one side of the prism Wh?le the prism head towered the south. The results show that there is an increasing in the solar ray concentrators and the cell area is reduced.
In this research , we tried to identify the meaning empowerment in the development literatures , and inquire the most enabling prominent actions to promote women , as we considered the most important international conferences that take up the subject of women's empowerment .
In the context of research on the subject of empowering women to occupy leadership positions , we tried to diagnose the target of the empowerment , and we clarify the correlation between human development and empowerment of women , also the research touched on the decision (1325) issued by the United Nations , which includes provisions regarding the importance of women participation at all levels in the process of decision-making .
We realized that there are so
The aim of the research is to estimate the hidden population. Here، the number of drug users in Baghdad was calculated for the male age group (15-60) years old ، based on the Bayesian models. These models are used to treat some of the bias in the Killworth method Accredited in many countries of the world.
Four models were used: random degree، Barrier effects، Transmission bias، the first model being random، an extension of the Killworth model، adding random effects such as variance and uncertainty Through the size of the personal network، and when expanded by adding the fact that the respondents have different tendencies، the mixture of non-random variables with random to produce
... Show MoreRespiratory syncytial virus (RSV) is an important cause of respiratory infection among children and infants globally. The first line of the immune response against this virus is neutrophils, macrophages, and innate lymphoid cells. Antigen‑presenting cells such as dendritic cells which present the viral antigen to T lymphocytes that mediate viral clearance by T cytotoxic cells and initiate systemic lymphopenia. Humoral immunity will also be stimulated through B‑cell‑stimulating factors derived from epithelial cells of the respiratory tract that play an important factor in antibody production and induction memory to reinfection through IgG and IgA protective antibodies that are useful in vaccine production.
Many Iraqi students are reluctant to actively participate in the English
language classroom. This reluctance is attributed to a number of factors, above which
is students' lack of thinking skills necessary to express their points of view. This
eventually results in passive learning, a real problem in English language learning in
Iraq.
A need for educational reforms and innovations seems essential. These involve
developing relevant teaching materials, adopting learner-centered approach,
promoting learner autonomy, and enhancing critical thinking.
This study is hoped to assist teachers of English to initiate change and foster
the expansion of thinking, and adopt various new strategies to increase classroom
par
Due to the difficulties that Iraqi students face when writing in the English language, this preliminary study aimed to improve students' writing skills by using online platforms remotely. Sixty first-year students from Al-Furat Al–Awsat Technical University participated in this study. Through these platforms, the researchers relied on stimuli, such as images, icons, and short titles to allow for deeper and more accurate participations. Data were collected through corrections, observations, and feedback from the researchers and peers. In addition, two pre and post-tests were conducted. The quantitative data were analysed by SPSS statistical Editor, whereas the qualitative data were analyzed using the Piot table, an Excel sheet. The resu
... Show MoreIn this research the subject of human ability to change, as it is proven in the Koran , which is proof of the argument against the ability of human change , whether the change in the positive or negative direction .
Here the limits of the research are limited to a study of analysis of human ability to change and this establishes the important of knowing that man has the ability while in the wrong way to change the path to the right path which Gifts and guidance .
The search required three demands and conclusion
- The first required :- is to try the idolaters to take out believers by right .
- The second required :- is to change what is inside the soul as a reason to enter blessings on man .
- The third required :- is good
An investigation was provided in this work for the host range of brown soft scale Coccus hesperidum Linnaeus in Baghdad Province. Five plant species were found infected by this insect, three of these species, Citrusaurantium L. (Rutaceae); Nerium oleander L. (Apocynaceae); Ficuscarica L. (Moraceae) reported earlier, and the remaining two, Dahlia pinnata Cav. (Asteraceae) and Myrtuscommunis L. (Myrtaceae) are recordedhere for the first time as host plants for this pest.
The newly synthesized Schiff base ligand (E)-2-((2-phenylhydrazono)methyl)naphthalen-1-ol (phenyl hydrazine derivative), is allowed to react with each of the next mineral ion: Ni2+, Cu2+, Zn2+andCd2+successfully resulting to obtain new metal complexes with different geometric shape. The formation of Schiff base complexes and also the origin Schiff base is indicated using LC-Mass that manifest the obtained molar mass, FT-IR proved the occurrence of coordination through N of azobenzene and O of OH by observing the shifting in azomethines band and appearing of M-N and N-O bands. Moreover, we can also detect by such apparatus, the presence of aquatic water molecule inside the coordination sphere. UV-Vis spectra of all resultants reveale
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More