God created man with a social nature, that is, man cannot live alone, but there must be a society associated with him. And when God addressed Adam, the first of His creation, he addressed him with the speech of the Muthanna to him and his wife. “This tree, then you will be among the wrongdoers” (Al-Baqara: 35), and thus was the divine discourse for the first human experience on earth. It accommodates a social relationship, which is (the family), husband and wife. And since a person needs to meet, as Ibn Khaldun said: (The human meeting is necessary, and the wise men express this by saying (the human being is of course civil)) (). And as it is known that with the meeting, relations arise from love and hate, cooperation and struggle, and thus the social reality of the human society arises
Colloidal dispersions of mono Au, Ag , Cu and bimetallic Ag/Au and Cu/Au
core/shell nanoparticles are synthesized by pulsed laser ablation of metals targets
immersed in 5 ml distilled water (DW). Surface Plasmon resonance (SPR) and
particle sizes are characterized by UV-VIS and HRTEM, the X-ray diffraction
shows the structure of core/shell. The Surface Plasmon resonance of the produced
nanoparticles solutions for silver nanoparticles about 402 nm and copper
nanoparticles about 636 nm. While for the core-shell observed two peaks of SPR,
Ag/Au core/shell at (406-516) nm, and Cu/Au core/shell observed one peak at
565nm, because the region of gold and copper close together. The shape and
particle size have been con
Background: Recent advancements in molecular techniques have identified over 450 genotypes of Human Papillomavirus (HPV), classified into low- and high-oncogenic risk categories. The rise in high-oncogenic risk HPV genotypes has been linked to various cancers, including those affecting the oral, oropharyngeal, and nasopharyngeal regions in both pediatric and adult populations. Methods: In this study, a cohort of 102 tonsillar tissue samples was included. This comprised 40 specimens from pediatric patients aged 4 to 9 years with nasopharyngeal adenoid hypertrophies, and 42 specimens from pediatric patients aged 5 to 12 years with palatine tonsillar hypertrophies. Among the 82 tonsillar tissue samples analyzed, 38 were from pediatric patients
... Show MoreIn this work, a Photonic Crystal Fiber (PCF) sensor based on the Surface Plasmon Resonance (SPR) technology was proposed. A thin layer of gold (Au) was deposited on a D-shaped Photonic Crystal Fiber (PCF), which was coated with plasmonic chemically stable gold material with a thickness of 40nm. The performance parameters like sensitivity including wavelength sensitivity and amplitude sensitivity and resolution were evaluated by simulation using COMSOL software. The proposed sensor was created by using the finite element approach, it is numerically examined. The results show that the surface of D-shaped Photonic Crystal Fiber coated with Au behaves as a sensor to detect the refractive index (IR) of toxic metal ions. The impacts of the str
... Show MoreThis work focused on principle of higher order mode excitation using in- line Double Clad Multi-Mode Mach-Zehnder Interferometer (DC-MM-MZI). The DC-MM-MZI was designed with 50 cm etched MMF. The etching length is 5cm. The tenability of this interferometer was studied using opt grating ver.4.2.2 and optiwave
ver. 7 simulator. After removing (25, 35, 45, 55) μm from MMF and immersing this segment of MMF with water bath contained distilled water and ethanol, in addition to, air. Pulsed laser source centered at 1546.7nm ,pulse width 10ns and peak power 1.33mW was propagated via this interferometer Maximum modes were obtained in case of air surrounded media which are 9800 and 25 um removed cladding layer, with peak power 49.800 m
يعد بيان التدفق النقدي من البيانات المهمة الصادرة من الوحدات الحكومية غير الهادفة للربح، بعد تبنيها معايير IPSASs ، مما يوفر معلومات اوسع تلبي حاجات المستخدمين لأتخاذ القرارات المناسبة . أذ يتضمن بيان التدفق النقدي بموجب المعيار رقم ( 2 ) التدفقات النقدية حسب الأنشطة التشغيلية و الاستثمارية والتمويلية ، وهذا لا ينسجم مع مخرجات النظام المحاسبي الحكومي العراقي . وان هدف البحث هو التعرف
... Show MoreThis paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreThe study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More