Cadmium has been known to be harmful to human healthy , manily Via contaminated drinking water , food supplies , tobacco and industrial pollutant . The aim of this study was to determine the toxicity of new Cadmium (II) complex ( Bis[ 5- ( P- nitrophenyl ) – ? 4 – Phenyl- 1,2,4- triazole -3- dithiocarbamatohydrazide] cadmium (II) Hydra ( 0.5) and compare it with anticancer drug cyclophosphamide ( CP) in female albino mice . This complex causes to several alterations in Enzymatic activity of Glutamate Pyruvate Transaminase (GPT) and Alkaline Phosphatase (ALP ) in three organs after the treatment of mice with different doses of a new cadmium (II) complex ( 0.09 / 0.25ml , 0.18/ 0.5ml and 0.25mg /0.7 ml /30 gm of mouse ) for three days by the decreased of Glutamate Pyruvate Transaminase activity in lung , Liver and kidney , while the Alkaline Phosphatase activity was increased in kidney , lung and liver . The results were indicated that no significant differences ( P > 0.05 ) in Glutamate Pyruvate Transaminase activity between the treatment of mice with cadmium ( II ) complex and cyclophosphamide (CP) in the liver , kidney and Alkaline Phosphatase activity in the liver at each three doses .
Persuasion is an indispensable skill in everyday life; that is why, it has aroused researchers’ interest. This study aims to investigate the most frequently used persuasive strategies in texting WHO COVID-19 Virtual Press Conferences and explore how these strategies are employed to achieve persuasive messages.To this end, a text of WHO COVID-19 Virtual Press Conferences has been chosen randomly to be analyzed based on Dillard and Shen’s (2013) “Persuasive strategies in Health Campaigns”. A qualitative method has been adopted in analyzing the selected data to investigate the credibility and validity of the persuasive strategies used in such a domain. Findings have shown that most of the persuasive appeals based on the adopted mode
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe CO2-Assisted Gravity Drainage process (GAGD) has been introduced to become one of the mostinfluential process to enhance oil recovery (EOR) methods in both secondary and tertiary recovery through immiscibleand miscible mode. Its advantages came from the ability of this process to provide gravity-stable oil displacement forenhancing oil recovery. Vertical injectors for CO2 gas have been placed at the crest of the pay zone to form a gas capwhich drain the oil towards the horizontal producing oil wells located above the oil-water-contact. The advantage ofhorizontal well is to provide big drainage area and small pressure drawdown due to the long penetration. Manysimulation and physical models of CO2-AGD process have been implemented
... Show MoreThe report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show MoreJurisprudential disagreements are a significant source of a vast jurisprudential wealth. Among the manifestations of these disagreements are scholarly critiques raised by some scholars against others, claiming their divergence from the legal evidence or established principles for deducing legal rulings. One such critique is presented by the narrator scholar Abu Bakr Ibn Abi Shaybah, may Allah have mercy on him, directed towards Abu Hanifah al-Nu‘man, may Allah have mercy on him. In his compilation, Ibn Abi Shaybah cited numerous hadiths and traditions that he considered conflicting with the judgments as perceived by Imam Abu Hanifah, may Allah have mercy on him. These issues cover various branches of jurisprudence, including worship, sale
... Show MoreThe aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreThe advertising has emerged as an effective force and an effective instrument upon with all organizations and companies depend on achieving their goals. In additional to the need to use promote sales, The nature and objective of advertising go beyond the scope of specific personal communication to a broader and more effective range for consumers from multiple groups and combination play need to use as well as the need to use means of communication than com convey the message more professional, The coincides with the rapid and remarkable development of all different media technologies and as much as possible social networking sites including mobile phone companies. The advertising has emerged as an effective force and an effective instrum
... Show Morepublishing has become a large space in the field of interactive education and modern pages have become dedicated to the service of the educational effort in this area as the research in this context of the urgent scientific necessities, especially as we consider in Iraq from the new countries in the exploitation of these new technologies and investment possibilities of the information network And the contents of different in the framework of so-called distance education Here lies the problem of research in the possibility of finding scientific solutions for the design of interactive inter active website for students of the preparatory stage in Iraq and to find out the scientific ways to find des
... Show MoreObjective (s): to assess nurses' practices regarding discharge planning post-cardiac surgery and to find out the relationship between nurse practices and demographic characteristic (age, gander, level of education, years of experiences, and years of experiences in surgical ward).
Methodology: A descriptive study was carried out at cardiac centers and hospitals in Baghdad (Ibn Al- Bitar specialized center for cardiac surgery; Iraqi center for heart disease and Ibn al Nafees hospital). For the period of 6th February 2017 up to 1st of June 2018. A non-probability (purposive) sample of (58) nurses (male & female) who were working in surgical wards. The data was collected, by using of a questionnaire, which consists of two parts, part
Due to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi
... Show More