Corruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
Gas sensors are essential for detecting noxious gases that have a detrimental effect on people's health and welfare. Carbon quantum dots (CQDs) are the fundamental component of gas detectors. CQDs and graphene (Gr) were prepared using the electrochemical method. The gas sensitivity of these materials was evaluated at different temperatures (150, 200, 250 °C) to assess their effectiveness. Subsequently, experiments were conducted at different temperatures to ascertain that the combination of CQDs and Gr, with various percentages of Gr and CQDs, exhibited superior gas sensitization properties compared to CQDs alone. This was evaluated based on criteria such as sensitivity, recovery time, and reaction time. Interestingly, the combination was
... Show MoreThe Reasons behind the decadence of the studies concerning the evening school in Salah al Deen A field study
An anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored. A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure. Pharmacological
... Show MoreIn this paper, the bowtie method was utilized by a multidisciplinary team in the Federal Board of Supreme Audit (FBSA)for the purpose of managing corruption risks threatening the Iraqi construction sector. Corruption in Iraq is a widespread phenomenon that threatens to degrade society and halt the wheel of economic development, so it must be reduced through appropriate strategies. A total of eleven corruption risks have been identified by the involved parties in corruption and were analyzed by using probability and impact matrix and their priority has been ranked. Bowtie analysis was conducted on four factors with high score risk in causing corruption in the planning stage. The number and effectiveness of the existing proactive meas
... Show MoreObjective: Many studies focused on clinical cases such as ovariohysterectomy of bitches and scarcely mentioned the histological features. The present study describes the cytoarchitecture characteristics of a local dog’s mature adult reproductive tract. Materials and Methods: Sixteen samples of uterus and cervix were obtained from local breed bitches to conduct this study. The organs were processed according to routine histopathological protocol and stained with hematoxylin and eosin, Masson’s trichrome, and combined Alcian blue (2.5 pH) and PAS (AB-PAS) stains. Results: The mature endometrium formed numerous short epithelial folds and epithelial crypts composed of mucous cells and cuboidal cells. The core of the endometrium is c
... Show MoreThe paper is concerned with a linguistic analysis of the blurbs, used in advertising English and Arabic novels. A blurb is an advertising persuasive text, written on the back cover of a book. Blurbs of selected novels are chosen as representative examples. The selected blurbs belong to two languages, Arabic and English. The paper aims at studying the linguistic features that are characteristic of blurbs as advertising texts and making a sort of comparison between English blurbs and Arabic ones. A linguistic analysis on four levels is presented. Blurbs are tackled from the point of view of four linguistic disciplines that are phonology, syntax, semantics and discourse analysis. A reference is made to the linguistic featu
... Show MoreIn the present study NiPcTs, CdS thin films, and Blends of NiPcTs:CdS were prepared with 1:2 content mixing ratio of NiPcTs to CdS solutions. Cadmium chloride and thiourea were used as the essential materials for deposition CdS thin films while using organic powder of NiPcTs to deposit NiPcTs nanostructure films. The spin-coating technique was employed to fabricate the NiPcTs , CdS films and NiPcTs-CdS blend. Structural properties of films have been investigated via X-Ray diffraction(XRD),and show that thin films of NiPcTs, and CdS have monoclinic and polycrystalline hexagonal structure respectively while the blend has two polycrystalline structure with cubic and hexagonal phases. Atomic force microscope (AFM) confirmed that the surf
... Show MoreMagnetic Resonance Imaging (MRI) uses magnetization and radio waves, rather than x-rays to make very detailed, cross- sectional pictures of the brain. In this work we are going to explain some procedures belongs contrast and brightness improvement which is very important in the improvement the image quality such as the manipulation with the image histogram. Its has been explained in this worked the histogram shrink i.e. reducing the size of the gray level gives a dim low contrast picture is produced, where, the histogram stretching of the gray level was distributed on a wide scale but there is no increase in the number of pixels in the bright region. The histogram equalization has also been discuss together with its effects of the improveme
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show More