Studied the effect of foliar fertilizers Alaongrin results showed that spraying fertilizer Alaongrin and Fertilizers and Ministry of Agriculture and rack licorice extract every three weeks after thirty days from planting seedlings
Background: There is a strong desire of adolescent to have a peer group and to be appreciated and also to become a member of this group which can affect one each other. There for; encourage, adapting,and imitating of friends and group consider as the main reasons behind starting of smoking among youngsters. Smoking habits in the family were found tobe acause of smoking pressure among adolescentas peer pressure. Smoking habit may be started before 18 years of age in most adult smokers.
Objectives: To study the effect of peer pressure and family smoking habiton the prevalence of smoking among secondary school students.
Type of the study: A cross
... Show MoreThis research aims to know the reality of implementation of Knowledge Management in Saudi Universities Applied in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.
The study investigated the university staff in Shaqra, Thadig, and Huraymila branches, using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.
The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Background: The prevalence of obesity is continuously rising world-wide. Obesity is an important risk factor of cardiovascular disease (CVD), metabolic syndrome (MS), and type 2 diabetes (T2D).
Objective: To estimate the frequency of MS in obese versus non-obese subjects in Basrah, Iraq .
Methods: This is a prospective clinical study performed in Al-Sadr Teaching Hospital, Basrah, and included 86 obese subjects (with a BMI ≥ 30), 39 males and 47 females, and 132 non-obese subjects ( with a BMI < 30 ), 60 males and 73 females as a control group. Measurement of height, weight, waist circumference (WC), blood pressure ( BP ), fasting blood glucose ( FBG ), total cholesterol (TC), triglycerides (TG ) and high density lipoprotein-
Objectives: To assess general social factors for elderly in geriatric homes in Jordan.
Methodology: The study was conducted for clients residing in elderly homes. A purposive sample of (155)
residents were selected. Social resource scale by (Duck University Center) called (OARA) older adult resources
and services was used as tool for data collection. The questions extract data about family structure, patterns of
friends and visiting, availability of a confident, satisfaction with the degree of social interaction and availability
of a helper in the event of illness or disability and the program of trips in the houses.
Results: The findings revealed that the life expectancy for women is greater than for men. In respect to
Background: Bell's palsy was defined as facial weakness of lower motor neuron type caused by idiopathic facial nerve involvement outside the central nervous system without evidence of aural or more widespread neurologic disease. The cause is unclear, but the disorder occurs more commonly in diabetics.Objectives: to differentiate cases of idiopathic Bell's palsy from diabetic mononeuropathy presented with Facial nerve palsy by assessing the taste, because they differ in etiology, management & prognosis.Patients &Methods: One hundred and fifteen consecutive patients were referred for the treatment of facial palsy, from May the 5th 2012 to April 12th 2013 in Al-Kindy Teaching Hospital and The Neurosciences Hospital, in Baghdad / Ira
... Show MoreAlzheimer’s disease (AD) is a progressive disorder that affects cognitive brain functions and starts many years before its clinical manifestations. A biomarker that provides a quantitative measure of changes in the brain due to AD in the early stages would be useful for early diagnosis of AD, but this would involve dealing with large numbers of people because up to 50% of dementia sufferers do not receive formal diagnosis. Thus, there is a need for accurate, low-cost, and easy to use biomarkers that could be used to detect AD in its early stages. Potentially, electroencephalogram (EEG) based biomarkers can play a vital role in early diagnosis of AD as they can fulfill these needs. This is a cross-sectional study that aims to demon
... Show MoreThe ability of beans (Phaseolus vulgaris L.) to uptake three pharmaceuticals (diclofenac, mefenamic acid and metronidazole) from two types of soil (clay and sandy soil) was investigated in this study to explore the human exposure to these pharmaceuticals via the consumption of beans. A pot experiment was conducted with beans plants which were grown in two types of soil for six weeks under controlled conditions. During the experiment period, the soil pore water was collected weekly and the concentrations of the test compounds in soil pore water as well as in plant organs (roots, stems and leaves) were weekly determined.
The results showed that the studied pharmaceuticals were detected in all plant tissues; their concentration
The ï¤- Multiple mixing ratios of ï§-transitions from levels of 56Fe populated in 56 56 ( , ) Fe n n Fe ï§ ï‚¢ reactions are calculated by using const. S.T.M. This method has been used in other works [3,7] but with pure transition or with transitions that can be considered as pure transitionsØŒ in our work we used This method for mixed ï§ - transitions in addition to pure ï§ - transitions. The experimental angular distribution coefficients a2 was used from previous works [1] in order to calculet ï¤- values. It is clear from the results that the ï¤- values are in good agreement or consistent, within associated errors, with those reported previously [1]. The discrepancies that occur
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show More