The researcher wanted to make an attempt to identify the foundations of social solidarity, to strengthen the bonds of brotherhood among society, and spread the causes of compassion in the hearts of its members.
The researcher has taken a short course in the hearts of the beloved to hearts.
The study includes building a 3-D geological model, which involves get the Petrophysical properties as (porosity, permeability and water saturation). Effective Porosity, water saturation results from log interpretation process and permeability from special correlation using core data and log data. Clay volume can be calculated by six ways using IP software v3.5 the best way was by using gamma Ray. Also, Water Resistivity, flushed zone saturation and bulk volume analysis determined through geological study. Lithology determined in several ways using M-N matrix Identification, Density-Neutron and Sonic-Neutron cross plots. The cut off values are determined by Using EHC (Equivalent Hydra
Mycotoxins are secondary by-products of mold metabolism and are accountable for human and animal mycotoxicosis. The most serious trichothecenic mycotoxin is the fungal T-2 mycotoxin. T-2 mycotoxin impaired nutrient absorption, metabolism, and then, eliciting severe oxidoreductive stress. Diet plays a key role beyond the supply of nutrients in order to promote animal and human health. Organic acids have been commonly used to exert antioxidative stress capacity in the liver and gut ecosystem. This study is planned to explore, the competence of using (X-MoldCid®) during chronic T-2 mycotoxicosis course in rat. Rats were allocated into 4 main groups, (CN-Gr), negative control and was allowed for the free access to the normal rats chow and the
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreAs a marker of systemic inflammation, raised (C-reactive protein (CRP)) concentrations which are still within the normal range have been associated with an increased inflammation of chronic renal diseases (CRD). The current study aimed to establish potential determinats of raised CRP concentrations in patients who treated in Heamodialysis room,then study the relationship between CRP& some biochemical parameters related CRD We used a CRP latex reagents Kit which is based on an immunological reaction between CRP antisera bounded to the biologically inert latex particles or with CRP in the test specimens of 19 patients with (CRD) mean age 48 years ,range = 30?65 & in 21 healthy subjects as control group their age range = 30 ?45 years. The
... Show MoreThe nature of the dark sector of the Universe remains one of the outstanding problems in modern cosmology, with the search for new observational probes guiding the development of the next generation of observational facilities. Clues come from tension between the predictions from Λ cold dark matter (ΛCDM) and observations of gravitationally lensed galaxies. Previous studies showed that galaxy clusters in the ΛCDM are not strong enough to reproduce the observed number of lensed arcs. This work aims to constrain the warm dark matter (WDM) cosmologies by means of the lensing efficiency of galaxy clusters drawn from these alternative models. The lensing characteristics of two samples of simulated clusters in the Λ warm dark matter and ΛCDM
... Show MoreAccording to so many previous studies, lack of sufficient information during prescribing steps may lead to medication errors. Thus, the presence of the clinical pharmacist during routine rounding process in the ward with intervention of patient care plan may reduce the probability of adverse drug events (ADEs).This study evaluate role of the clinical pharmacists, as a member of medical team with the physician, on ADEs and report their interventions in the internal medicine unit. This study was designed to compare between two groups of patients, those receiving care from a rounding team (physician, nurse, and clinical pharmacist) (study or intervention group with 51 patient); and those receiving c
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show More