0
The minimum approaches distance of probing electrons in scanning electron microscope has investigated in accordance to mirror effect phenomenon. The analytical expression for such distance is decomposed using the binomial expansion. With aid of resulted expansion, the distribution of trapped electrons within the sample surface has explored. Results have shown that trapped electron distributes with various forms rather an individual one. The domination of any shape is mainly depend on the minimum approaches distance of probing electrons
The study of cooperative education is important not only for researchers but also for those interested in studying educational methods, such as university professors, teachers in schools, and all educational institutions. This is because of its effectiveness in teaching students, developing their skills, developing their ideas and employing them in the study and finding appropriate solutions to the questions posed by the teacher. It also helps in instilling a spirit of cooperation among the students by dividing them into groups to achieve the desired goals. The aim of the study is to clarify how important it is for teachers to use cooperative education in addressing the educational, social and psychological aspects when teaching stu
... Show MoreThe childhood of the most important stages throughout the human and which have been more vulnerable to various factors surrounding it and with the scientific and cognitive development in all fields surfaced many psychological phenomena that play a large role in influencing children and their behavior trends is the susceptibility of the lure of psychological phenomena which plays a major role in the social attitudes of individuals it may not be predictable so that individuals vary in between them in terms of vulnerability Balasthoa You do this only _bl that the same individual at different influenced Balasthoa different depending on the positions and this was research to achieve its objectives and that are known:
_ alasthoa The childre
Objective: To assess role of obesity in Covid-19 patients on antibodies production, diabetes development, and treatment of this disease. Methodology: This observational study included 200 Covid-19 patients in privet centers from January 1, 2021 to January 1, 2022. All patients had fasting blood sugars and anti-Covid-19 antibodies. Anthropometric parameters were measured in all participants. Results: The patients were divided into two groups according to body weight; normal body weight (50) and excess body weight (150). There was a significant difference between them regarding age. Diabetes mellitus developed in 20% of normal weight patients while 80% of excess weight patients had diabetes (p=0.0001). Antibodies production (IgM and
... Show MoreThe current study was conducted in the period extending from November 2018 to October 2019 and designed as a case-control study and aimed to assess the seroprevalence of HCMV. However, a total number of 91serum specimens were collected to fulfill this purpose from females (71 breast cancer patients, and control group of 20 females) attending Al-Amal hospital for cancer management and Baghdad teaching hospital and the practical part was performed in College of Science, University of Baghdad. The study protocol was approved by the Ethics Committee at the Department of Biology (Reference: BEC/0220/0011). The immunological part for evaluation of seroprevalence of HCMV was accomplished by ELISA technique which revealed that anti-HCMV IgG was sco
... Show MoreMicrobial antibiotics resistance is considered a serious health issue in the Middle East and developing countries. In this study, the Fe2O3 nanoparticles was prepared chemically, and the particles size and shape were analyzed by using Scan electron microscope (SEM) and X-Ray diffraction (XRD). Different concentration of Fe2O3 nanoparticles were used and examined on E.coli and S. aureus. Using liquid dilution and in vitro cytotoxicity assay by microplate toxicity test (MTT). The microbial cell metabolic activity was measured on gram-negative, gram-positive bacteria and fungi after treating with different concentrations of Fe2O3 nanoparticl
... Show MoreThis paper displays a survey about the laboratory routine core analysis study on ten sandstone core samples taken from Zubair Reservoir/West Quarna Oil Field. The Petrophysical properties of rock as porosity, permeability, grain's size, roundness and sorting, type of mineral and volumes of shales inside the samples were tested by many apparatus in the Petroleum Technology Department/ University of Technology such as OFITE BLP-530 Gas Porosimeter, PERG-200TM Gas Permeameter and liquid Permeameter, GeoSpec2 apparatus (NMR method), Scanning Electron Microscopy (SEM) and OFITE Spectral Gamma Ray Logger apparatus. By comparing all the results of porosity and permeability measured by these instruments, it is clear a significant vari
... Show MoreThis paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More