Researching the effects of the research and technological development contract, determining its extent and demarcating the boundaries of the obligations imposed in it, is the cornerstone of economic growth and development, because defining these obligations removes the ambiguity and conflict between interests, by stating the rights owed to each party and even trying to reconcile them, or impose protection by specifying guarantees that are compatible with the essence of the R&D contract, For the purpose of studying the subject thoroughly, we will divide this research into two sections. The first is devoted to identifying the parties to the research and technological development contract. As for the other topic, we will explain the obligations of the parties to the research and technological development contract
This work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show MoreObjective: The descriptive study was used to evaluate nursing staff performance in cardiac care units at teaching
and non teaching hospitals in kirkuk city: A comparative study.
Methodology: A descriptive study was used to evaluate nursing staff performance in cardiac care units. The study
was conducted from December 29th
, 2013 up to the 27th of Apr. 2014. A non-probability (purposive) sample of
(44) nurses who work in cardiac care unit at Azady teaching Hospital and Kirkuk general Hospital was evaluated by
a questionnaire which consisted of two parts; the first part is concerned with the demographic characteristics of
the nurses and the second part concerned Observation check list for evaluation nursing staff Perfo
Background: This study was conducted to assess the effect of sonic activation and bulk placement of resin composite in comparison to horizontal incremental placement on the fracture resistance of weakened premolar teeth. Materials and method: Sixty sound human single-rooted maxillary premolars extracted for orthodontic purposes were used in this study. Teeth were divided into six groups of ten teeth each: Group 1 (sound unprepared teeth as a control group), Group 2 (teeth prepared with MOD cavity and left unrestored), Group 3 (restored with SonicFill™ composite), Group 4 (restored with Quixfil™ composite), Group 5 (restored with Tertic EvoCeram® Bulk Fill composite) and Group 6 (restored with Universal Tetric EvoCeram® co
... Show MoreThe current study was designed to evaluate the anti-inflammatory effect of GKB in the rat model of granulomatous inflammation. Thirty rats were distributed into five groups: The first group served as negative control group that received distilled water (DW) only without inducting inflammation, positive control group; treated with DW with the induction of inflammation and they were assigned to cotton pellet-induced granuloma, ginkgo biloba (GKB) treated group (200mg/kg/day), dexamethasone-treated group (1mg/kg), and Prednisolone treated group (5mg/kg). All the treatments were given orally for seven consecutive days. On day eight, the rats were anesthetized and the pellets together with granulation tissue were carefully removed
... Show MoreMany studies have evaluated the effect of platelet rich plasma (PRP) in the treatment of non-union fractures but few studies have investigated their effect on the union of femoral neck fractures or their functional outcome in young adults. The aim of this study was to evaluate the union time and functional outcome in young adult patients with femoral neck fracture managed by three cannulated screws injected with PRP and those managed by fixation only. This prospective study included 24 patients diagnosed with femoral neck fractures within 24 hours of presentation. Twelve cases in group A were managed by closed reduction and three cannulated screws fixation injected with PRP; twelve patients in group B were managed only by closed reduction a
... Show MoreA new colorimetric-flow injection method has been developed and validated for the detection of Cefotaxime sodium in pharmaceutical formulations. This method stands out for its rapid and sensitive nature. The formation of a brown-colored complex between Cefotaxime sodium and the Biuret reagent in a highly alkaline environment serves as the basis for the detection. The intensity of this colored complex is measured using a custom-built Continuous Flow Injection Analyzer, enabling accurate quantification of Cefotaxime sodium. Optimization studies of the chemical and physical parameters such as dilution of Biuret reagent, effect of the medium basicity, flow rate, sample loop and others have been investigated. The calibration gra
... Show MoreEducation is the most powerful and important weapon in fighting poverty and unemployment because it provides students with new skills that appropriate the new market requirements and fair distribution of natural resources. It also transfers knowledge, skills, and ethics over generations. Education aims to create effective leaders who go under training and rehabilitation process, create a new human and instill faith, generate the creativity and innovation, and keep abreast with scientific process, updating curriculum, and finally, applying the technical education
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More