The communication inspiration formed an essential foundations for contribute the influence individuals and recipients, whether negatively or positively, through the messages that were published and presented in them with multiple themes and viewpoints that covered all parts of the world and all age groups; it is directed to children addressing the various stages of childhood, as it simulates many goals, including what is directed through the digital use of educational data in television production, as it is considered an intellectual and mental bag to deliver ideas and expressive and aesthetic connotations to children, where the songs and cartoons carrying data on education; within adjacent relations and in a mutual direction, both of them support each other to achieve meaning and awareness. So that, the foregoing, the researcher has taken to delving into the folds of this title and its axes in a group of horizons and depth in its contents in terms of content and form; also, the exposure to the system of educational values in education and the age groups of children, as well as a review of the digital use of educational data in children's television programs and the method of technical treatment of them; the research aims to study the subject in its aspects, and from this point of view, the researcher formulated the research problem to launch his study with the following question; what are the technical and digital uses and treatments of education data in television production, and since it aims to reveal the employment of digital employment of educational data in children’s television programmes, the approach was adopted for descriptive (content analysis) being more appropriate to achieve the goals and reach the desired results, among which lies the plurality of contents and educational values in the children’s television program from the production of data that contribute to the establishment of education through digital software to produce an expressive, semantic and aesthetic level.
Abstract Introduction: Aphthous stomatitis is a recurring oral ulceration condition that affects a significant proportion of the population. While several factors have been proposed to contribute to its occurrence, the link between caffeine consumption, anxiety levels, and the development of aphthous stomatitis remains unknown. This survey-based study aimed to understand the association between coffee, anxiety, and the development of aphthous stomatitis in this specific demographic, which can provide useful insights for medical management as well as preventive strategies. Material and methods: A structured online questionnaire was distributed via various social media platforms targeting a sample of the Armenian population. The quest
... Show MoreDiabetes mellitus (DM) has been defined as a clinical syndrome that is characterized by abnormal carbohydrate metabolism. The chronic hyperglycemia of diabetes is associated with long term damage, dysfunction, and failure of different organs, especially the liver .This study was conducted to assess the effect obesity and insulin resistance on liver enzymes in diabetic Iraqi patients.A comparative study of (90) Iraqi adults divided to three subgroup(30) obese ,(30) nonobese diabetic patients and(30)person had used as control. The analysis included Liver enzyme ALP,ALT,AST,GGT ,Fasting Plasma Glucose (FBG) , Lipid Profile , Hemoglobin A1C , insulin and homeostasis model assessment of insulin resistance (HOMA IR) were measured. Subjects
... Show MoreBackground: e cerebellum is divided into two hemispheres and contains a narrow midline zone called thevermis. A set of large folds are conventionally used to divide the overall structure into ten smaller "lobules". evermis receives fibres from the trunk and proximal portions of limbs, But the question is that does the cerebellum have the same measurementvalues in males and females of the same age?Material and method: e present study used 80 sectional brain MRI images (40: males, 40: females); 35-50 years old as indices of size for thevermian structures of the Cerebellum. is middle age group was taken because as known generally it could be neither an age of growth as inthe young nor of atrophy as in old individuals. e aim rega
... Show MoreBackground: This study aimed to assess the effect of tooth shape ratio on mandibular incisor arrangement. Materials and methods: The sample included dental casts of some dental students and orthodontic patients having Class I dental and skeletal patterns with normal occlusion and severe crowding. The sample was divided into two groups according to the severity of crowding into: group I had Class I normal occlusion with mild or no crowded mandibular dentition and group II had Class I malocclusion with severe crowded mandibular dentition. Each group comprising of 40 subjects (20 males and 20 females). The mesio-distal and facio-lingual crown diameters were measured manually for each cast using modified vernier caliper gauge. Descriptive sta
... Show MoreInternational relations scholars have increasingly debated the evolving landscape of actors that challenge the traditional state-centric world order. A key element of this transformation is the rise of sub-state actors, which engages in alternative diplomacy parallel to the state, transcending traditional state-centric frameworks. This paper explores the significant shifts in international actorness over the late 20th century, focusing on the emergence and implications of sub-state diplomacy, or "paradiplomacy." First, the study introduces sub-state actors and their role in challenging the dominant state-centric discourse. It then examines the dynamic evolution of paradiplomacy, highlighting how sub-states have expanded their global
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreIn this study, active knife and fixed knife of single-row disc silage machine has three different clearance C1, C2 and C3 (1, 3 and 5 mm) and it is tried in three different working speed V1, V2 and V3 (1.8, 2.5 and 3.7 km / h) and PTO speed (540 min-1) and machine's fuel consumption (l/h), average power consumption (kW), field energy consumption (kW/da), product energy consumption (kW/t), field working capacity (da/h), product working capacity (t/h) and Chopping size distribution characteristics of the fragmented material were determined. It has been found that knife-counter knife clearances smaller than 3 mm (1 mm) and larger (5 mm) have a negative effect on machine performance in general. In terms of fuel and power consumptions, the m
... Show More