The political parties are considered to be the basic infrastructure in the political process for their great role in achieving the political movement in the country and to work on implementing the goals and interests of its voters in the event of their coming to power. If the parties that totalitarianism led to monopoly and monopolization, We can not talk in these countries about the liberal concept of the party and can not talk about the existence of a law or laws and regulations governing and regulate the work of parties. But on the other hand, which is represented by the liberal state, we find a lot of talk and practice about the form and nature of the legitimate law in regulating the formation of parties and their work in a manner th
... Show MoreThe current study aimed to investigate the viability of biofilm formation klebsilla pneumoniae and Staphylococcus aureus. 440 urine samples were collected from patients suffering from urinary tract infection (UTI) from those who were admitted and visitors to Al-Ramadi Teaching Hospital, Al-Yarmouk Teaching Hospital, Al-Ramadi Teaching Hospital for women and children and , Teaching Laboratories in the Medical City for both genders for a period extended from 5 July, 2017 to 10 October, 2017. Samples were diagnosed by culturing them on a selective media and by biochemical testes , also, diagnosis was ensured by using VITEK-2 compact system. Results showed that K.pneumoniae isolation ratio was 17.1%(68) and S.aureus ratio was 13.1%(52). Thei
... Show MoreWomen are considered the real power to build societies, as they are half of society, and it is their responsibility to raise generations، as human history testifies to the recording of great names with their giving and achievement in various scientific, social and humanitarian disciplines. Because of the importance of women in our lives, society must give them special care, whether at home or within the community structure to which they belong, so that they contribute to the image that brings about a transformation in the public scene, as well as providing them with support to take charge of bringing about change themselves, and this explains the interest of the press at all levels. Women's issues and topics through various journal
... Show Moreالوصف A simple chemistry method approach was used to synthesise new ligand derivate from L-ascorbic acid and its complexes. All of them were water-soluble and are used quite extensively in the medical and pharmaceutical fields. This study synthesised the new ligand derivative from L-ascorbic acid-base using the following steps: A 5, 6-O-isopropylidene-L-ascorbic acid was prepared by reacting dry acetone with L-ascorbic acid followed by reacting it with trichloroacetic acid to yield [chloro (carboxylic) methylidene]-5, 6-O-isopropylidene-L-ascorbic acid in the second stage. In the third stage, the derivative was reacted with (methyl (6-methyl-2-pyridylmethyl) amine to create a new ligand (ONMILA). This novel ligand was identified using
... Show MoreThe aim of the study was to evaluate the efficacy of diode laser (λ=940 nm) in the management of gingival hyperpigmentation compared to the conventional bur method. Materials and methods: Eighteen patients with gingival hyperpigmentation were selected for the study with an age between 12-37 years old. The site of treatment was the upper gingiva using diode laser for the right half and the conventional method for the left half. All patients were re-evaluated after the following intervals: 3 days, 7 days, 1 month and 6 months post-operation. Pain and functions were re-evaluated in each visit for a period of 1 day, 3 days and 1 week post-operation. Laser parameters included 1.5 W in continuous mode with an initiated tip (400 μm) placed in
... Show MoreThe adsorption behavior of Bismarck brown (BB) dye from aqueous solutions onto graphene oxide GO and graphene oxide-g-poly (n-butyl methacrylate-co-methacrylic acid) GO-g-pBCM as adsorbents was investigated. The prepared GO and GO-g-pBCM were characterized by Fourier transform infrared spectroscopy FTIR, which confirmed the compositions of the prepared adsorbents. Adsorption of BB dye onto GO and GO-g-pBCM was explored in a series of batch experiments under various conditions. The data were examined utilizing Langmuir and Freundlich isotherms. The Langmuir isotherm was seen as increasingly reasonable from the experimental information of dye on formulating adsorbents. Kinetic investigations showed that the experimental data were fitted ve
... Show MoreA simple chemistry method approach was used to synthesise new ligand derivate from L-ascorbic acid and its complexes. All of them were water-soluble and are used quite extensively in the medical and pharmaceutical fields. This study synthesised the new ligand derivative from L-ascorbic acid-base using the following steps: A 5,6-O-isopropylidene-L-ascorbic acid was prepared by reacting dry acetone with L-ascorbic acid followed by reacting it with trichloroacetic acid to yield [chloro(carboxylic)methylidene]-5,6-O-isopropylidene-L-ascorbic acid in the second stage. In the third stage, the derivative was reacted with (methyl(6-methyl-2-pyridylmethyl)amine to create a new ligand (ONMILA). This novel ligand was identified using a number
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More