Preferred Language
Articles
/
jcofarts-494
Stereotactic and its association with cognitive performance career: صلاح نوري محمود - ظبية محمد

The importance of this study of the growing importance of perception of touch and its association with the job performance of industrial product since the perception stereotactic means he means practiced by the individual through job performance and has assets of knowledge in the mind of the user and require him to mind the capabilities and knowledge cognitive following their individual focus Zhennea.oanfalh following their enthusiasm when using Sense of touch. The study in the first chapter of the research problem to reveal the role played by the process of cognition and its relationship with the touch function of the industrial product and the associated defect in performance and harder to use. The study also pointed to the research objectives and the importance of what gave him the information sings industrial designer and supports the design aspects of the relationship between global study perception stereotactic and Alozivih.fima touched second chapter to the concept of perception and its importance and how it is done through the delivery of perceptions to the brain, to be responsive and accessible then to the process stages Aladrakih.ouchml final chapter findings and recommendations and proposals have been the most important the following results:1-ahtot sample Find the perfect high values in terms of the functional level to come compatible with the perception stereotactic required as a target for research and 100%. 2-amtazat aesthetic value of the research sample appeared manifested in color and texture to come compatible with the public taste for users to Ha.bnsph 100%3-ba models Search and crossed markedly from which the desired functional value and the extent of consistency with the level of perception stereotactic according to private employment considerations and by 80%

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 03 2010
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The Incidence, Risk Factors and Diagnosis of Ventilator Associated Penumonia.

Background: The critically ill patient is at risk of developing intensive care acquired infection, with the lungs being especially vulnerable. Ventilator associated pneumonia (VAP) occurring after two days of mechanical ventilation and it is the most nosocomial infection seen in the intensive care unit .The establishment of an accurate diagnosis of ventilator associated pneumonia remains problematic and yet there is still no accepted "gold standard" for the diagnosis.
Patients& Methods: This is a cross section study for 328 patients admitted to intensive care unit at medical city teaching hospital. Full history, physical examination and investigation were done after 48 hours of admission according to

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
The Correlation between CMV Infection and Hypertension in Iraqi Patients

In order to study the correlation between CMV infection and increase in blood pressure among Iraqi patients, 201 blood samples were collected including; 88 male, 113 female hypertensive patients and 40 control samples. Patients sera were grouped into patients who are under medication (T), and patients who do not take any treat-ment for hypertension(NT). Samples were tested for CMV-IgM/IgG by ELISA, ren-in enzyme and interleukin-6(IL-6) levels were determined by ELISA too. The opti-cal density readings difference for CMV-IgG were significant between (T) and (NT) groups as well as when each group compared to control, level of renin enzyme showed significant difference between patients group(T and NT) and between each group compared to the

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Epidemiological and clinical study of leishmaniasis in Kirkuk city, Iraq

leishmaniasis is a disease of global concern, Leishmania types and  distribution rates vary from country to another. For visceral leishmaniasis serum samples were examined by the kala-azar dipstick rapid test. Meanwhile smears were taken from lesions, air dried, fixed and Leishman stained then microscopically examined for amstigote stage in cutaneous leishmaniasis. From April 2014 to April 2015, 150 samples for cutaneous leishmaniasis (CL) and 108 serum sample for visceral leishmaniasis (VL) from in and out patients in Pediatric, Azadi Teaching and Kirkuk General Hospitals were examined. The incidence of visceral leishmaniasis was very low (2.7%) comparing to that in cutaneous leishmaniasis (64.6%). No significant differenc

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Antibacterial and Phytochemical Study of Iraqi Salvia officinalis Leave Extracts

Sage (Salvia officinalis), belong to Labiatae family is indigenous to Iraq and other Mediterranean areas but now cultivated world- wide, principally for its use as culinary herb. In the present study preliminary screening for the important phytochemical natural product groups indicated the presence of flavonoid, saponin, hyrolysable and condensed tannin groups. The antibacterial  activity of two concentrations 10 mg/ml and 100 mg/ml of chloroform and hydroalcoholic extracts from  Salvia officinalis leaves was evaluated against four strains of gram negative bacteria (Escherichia coli,  Pseudomonas arigenossa,  Klebsiella pneumonia, and  Proteus spp) and two str

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
Methionine as a Spacer between Poly Acrylic acid and Ampicillin

In this work a novel drug delivery system through modification of poly acrylic acid with Methionine as a spacer between the poly acrylic acid which was converted to its acyl chloride and reacted with Methionine as spacer unit which has been reacted with Ampicillin drug. In vitro drug release study had been conducted successfully in basic medium in pH 7.4 and acidic medium in pH 1.1 at 37?. Due to many problems associated with drug release and, this modification could decrease the side effect of drug. The prepared prodrug polymer was characterized by spectra method [FTIR and 1H?NMR]. Physical properties and intrinsic viscosity of drug polymer were determined. The good results were obtained in the presence of spacer unit with compar

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Text-based Steganography using Huffman Compression and AES Encryption Algorithm

In every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs  provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p

... Show More
Scopus (3)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
Some Results about Acts over Monoid and Bounded Linear Operators

This study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that  functions as an act over S if and only if  functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and  is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following,  is acting over S if and only if  is a module where T is a nilpotent operator, is a

... Show More
Crossref
View Publication
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Al-Hafizh Abdan al-Ahwazi, 306 And his modern efforts

Abadan, one of the modernists, is the critics, whose words depend on the wound, the modification and the ills of the hadeeth.
He lived Abadan, age in the request to talk and take the elders, and Awali, and attribution, which affected him by taking, and update about (300) Sheikh or more.
Abadan also excelled in the novel and its origins, which made students talk to him, and ask for the novel, with his hardness and hardship. As we will see in the folds of the search

View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of The College Of Education For Women
The Middle East and Contemporary Geostrategic Shifts: A Geopolitical Study

This research focuses on the contemporary geostrategic transformations that afflicted the countries of the Middle East, with a focus on the countries of the Arab East, after the collapse of the system of international relations, and the emergence of the unipolar system led by the United States of America. After the events of September 11 and the events that followed, especially the occupation of Iraq in 2003, the study area witnessed a group of geopolitical variables and the emergence of dangerous phenomena that threatened the state structure in the countries of the Middle East; the most notably are the phenomenon of terrorism, cross-border armed groups, sectarian polarization, the phenomenon of migration and the internal and the externa

... Show More
Crossref
View Publication Preview PDF