The Present study aims to shed some light on the concept of authority of university students and to find statistically significant differences as regards this concepts in accordance with three variables gender (males, females),field of study(scientific ,humanities)and grade(second ,fourth). To accomplish the study a ( 7) level scale was developed for the concept of authority and it subjected to validity and credibility the scale was used with 590 student sample (237) males and (353) females Results show that male students show obedience to authority forms below the Avery e component with the theoretical Avery of the scale besides ,reinforcement was on the top of authority chain ,followed by person traits ,friends, affect punishment and traditional authority knowledge authority, Was the last addition ,there were no statistically significant difference concerning gender ,field of study and grade.
This study aimed to investigate the ability of clove and cinnamon extracts to make pathogenic multidrug-resistant (MDR) Klebsiella pneumoniae more sensitive to the host’s immune system and thereby interrupt the bacterial infection process in the rat model. Therefore, 60 Wistar male rats were used in this study. The phytochemical constituents of the plant extract were analysed using the gas chromatography-mass spectrometry (GC-MS) technique. Then, the capability of the plant extracts, as prophylactic and treatment, against K. pneumoniae in rats was studied by estimating the complete blood counts (CBCs) and the serum concentrations of interleukin-4 (IL-4) and interferon-gamma (IFN-γ) before and after the treatment. The results showed that
... Show MoreThis paper includes the application of Queuing theory with of Particle swarm algorithm or is called (Intelligence swarm) to solve the problem of The queues and developed for General commission for taxes /branch Karkh center in the service stage of the Department of calculators composed of six employees , and it was chosen queuing model is a single-service channel M / M / 1 according to the nature of the circuit work mentioned above and it will be divided according to the letters system for each employee, and it was composed of data collection times (arrival time , service time, departure time)
... Show More
Background: Malaria remains a leading cause of mortality in sub-Saharan Africa (including Sudan). C-reactive protein (CRP) is useful as a marker of severity in malaria. African studies have shown that serum CRP levels correlate with parasite burden and complications in malaria, especially falciparum. However, there are no data on CRP levels in Sudanese malaria patients.
This study aims to evaluate the association between CRP levels with comorbidities, species, and complications of severe malaria
Subjects and Methods: A cross-sectional study enrolled 65 severe malaria patients at Khartoum state hospitals during the period from April to June2021. Manifestations of severe
... Show MoreObjective: The present work was undertaken to investigate the impact of sub inhibitory concentration of gentamicin on hla gene expression in methicillin resistant Staphylococcus aureus isolates. Methods: The bacterial isolates used in this study represent 33 MRSA strains, previously isolated form patients visiting several hospitals in Baghdad. Gentamicin, vancomycin, and oxacillin MIC were determined using broth dilution method. Microtiter plate method was adopted to investigate the biofilm forming capacity. Alpha hemolysin was detected by culturing MRSA isolates on rabbit blood agar. Furthermore, hla gene was detected in MRSA isolates using conventional PCR technique; while, qRT-PCR method was performed to assay the hla expression in plank
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThe present study aims at examining quantitatively the morphometric characteristics of Iziana Valley basin that is located in the northern part of Iraq; particularly in south of Erbil Governorate. This basin is considered one of the small sub-basins where its valleys run on formations of the Triple and Quadrant Ages, which are represented by the Bay Hassan formations, and the sediments and mixed sediments of the cliffs, respectively. The area of the Iziana basin amounts to (36.39 km2) whereas the percentage of its rotation reaches (0.17); a low percentage, which indicates that the basin diverges from the circular to the rectangular shape. The value of the elongation ratio of the basin reaches (0.38) while the terrain rat
... Show MoreThe goal of this work is demonstrating, through the gradient observation of a of type linear ( -systems), the possibility for reducing the effect of any disturbances (pollution, radiation, infection, etc.) asymptotically, by a suitable choice of related actuators of these systems. Thus, a class of ( -system) was developed based on finite time ( -system). Furthermore, definitions and some properties of this concept -system and asymptotically gradient controllable system ( -controllable) were stated and studied. More precisely, asymptotically gradient efficient actuators ensuring the weak asymptotically gradient compensation system ( -system) of known or unknown disturbances are examined. Consequently, under convenient hypo
... Show MoreThe current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .