The design fabrics of the most important episodes that are at the core process rhetorical communication, until they became these episodes ample room for research and investigation, and the issue of non-familiar formality is nothing but the result of those relationships Constructivism, which is the result of an effort builders coherent activate the shape and attributes of phenotypic, therefore it will cause him a lot of questions about his and founded the organization in order to activate the speech communication between the product(cloth)and the receiver .On this basis, the research problem identified on imposing the question follows:1. Does the non-familiar formal role in enriching communication discourse of women's fabric designs?2. Are there foundations of design to enrich the speech communication through the form of others familiar? The research aims to disclose the role of non-formal unfamiliar to the enrichment of the speech communication designs for women's fabrics, design and developfoundationsforpracticalpurposestoenrichthespeechcommunicationthroughnon-formal familiar to women's fabric designs.In regard to the second quarter, which contained the theoretical frame work and previous studies, it was included in the board three sections, the first non-familiar in art and design, and the second placed structural elements in the design of cloth women, and the third concerned with the concept of speech communication in the design. Third chapter has dealt with procedures search. Fourth chapter search results and conclusions among the most important:1- The method abstract method mostly as a technical wizards out new designs far from copying and imitation.2 - Most of the designs focused on technology and reduction deletion and addition, forms and design vocabulary, which has worked to change the phenotypic traits formal vocabulary. Researcher and put the most important cornerstones of design to enrich the communication through speech form is not uncommon in women's fabrics and designs as follows:1 – rely on abstract art ,as away to form an unfamiliar configurations according to a new vision of contemporary creativity in the field of technical configuration
In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Beta thalassemia major (BTM) is a genetic disorder that has been linked to an increased risk of contracting blood-borne viral infections, primarily due to the frequent blood transfusions required to manage the condition. One such virus that can be transmitted through blood is the Human Parvovirus B19 (B19V). The aim of this study was to investigate the frequency and molecular detection of B19V. This study included 60 blood donors as controls and 120 BTM patients. B19V was identified by serology, which measured B19-IgG and B19-IgM antibodies. Nested Polymerase Chain Reaction (nPCR) was employed to target the VP1/VP2 structural proteins. The results showed that B19V seropositivity represents 27.5% (33 out of 120) in BTM patients, and
... Show MoreIn this work the corrosion behavior of Al metal was studied by using non- destructive testing (NDT), which is a noninvasive technique for determining the integrity of a material. The ultrasonic waves was used to measure the corrosion which occur by two corrosive medium (0.1N sodium chloride and 0.1N sodium hydroxide) and study the corrosion by weight-loss method and electrochemical method in addition to performance the microscopic inspection for the samples before and after the immersion in the corrosive medium. Corrosion parameters were interpreted in these media which involve corrosion potential (Ecorr) and corrosion current density (icorr). The results indicate that both
... Show MoreThe current research aims to identify the stressful life events among middle school students in terms of gender (male-female), academic branch (scientific-literary), and the Life Skills of the students of the preparatory stage in terms of gender (male-female), and academic branch (scientific-literary). Additionally, the study aims to identify the relationship between stressful life events and life skills in middle school students. A sample of (200) students who were selected randomly from the Directorate of education of Baghdad Karkh/ III was used in this study. To achieve the objectives of the current research, the researcher has adopted two scales, the stressful life events scale for the researcher Al-Sultan (2008), and the life skills
... Show MoreThe results of the current study showed that the thyroid gland in an adult domestic cat (Felis catus) is located in the neck area on both sides of the trachea at rings 1–5. The gland consists of two lobes (right and left), and it is surrounded by a capsule of connective tissue consisting of two outer and inner layers, and a layer of fatty tissue overlaps with the outer layer of the capsule. In addition, the results of this study found that the histological structure of the thyroid gland is composed of several follicles that appear in different sizes and shapes. The follicles are lined with simple cuboidal epithelial tissue and sometimes appear lined with high and low simple cuboidal epithelial tissue. The gland is histologically c
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreBackground: Oral squamous cell carcinoma (OSCC) is a common malignancy characterized by poor prognosis and low survival rate. The purpose of this study was to evaluate the Immunohistochemical expressions of BAD, MDM2, and P21as apoptotic markers in oral squamous cell carcinoma. Materials and methods: This study was performed on forty formalin-fixed paraffin-embedded blocks which histopathologically diagnosed as Oral Squamous Cell Carcinoma. All cases were collected from the Histopathological Laboratory from patients treated surgically at Maxillofacial surgery Department at Ramadi Teaching Hospital, Iraq. Results: The immunohistochemical staining of BAD showed positive expression in 39 (97.5%), MDM2 showed positive expression in 39(97.5%)
... Show MoreTo study the effect of iron overload due to continuous blood transfusions on peroxidation products, such as malondialdehyde (MDA) and peroxynitrite, with evaluation of some antioxidants like, glutathione (GSH), superoxide dismutase (SOD), vitamin A, vitamin C, vitamine E, Ceruloplasmin, uric acid and albumin in thalassemia patients. Forty patients with thalassemia major, aged 5 to 15 years, were carried out in Abn-Alatheer Teaching Hospital in Mosul city, during the period from October 2007 to April 2008. They were on Chelation therapy with desferÂrioxamine. They were divided into two groups, the first one without iron overload (90,97±12.92), and the second one with iron overload (157.75±7.57). All the patien
... Show More