Currently, there is no established of e-waste treatment in Thi- Qar province, while their creating is increasing every year. It has been well- known that e-waste is a source of environmental degrading and their placement in landfills increases the irreversible climate change. A research model has been developed to link three components: coercive pressure, normative influence, and mimicry, then study their effect on e-waste adopt and continuance intentions. The model was validated using data collected from a field survey of 92 managers of small enterprises in Thi-Qar province. A questionnaire was developed to collect data. It contains five major variables, exemplify by fourteen items. Also, five dimensions’ scale is used for the purpose of measuring, subjected to reliability and validity tests. Partial least squares (PLS) is used to test the research hypotheses and validate the model. The analysis that coercive pressure is the most influential in the attitudes toward e-waste disposal, while the normative pressures have had the most significant effect on the continuance of adoption of the e-waste practice. This study is contributed in existing knowledge in the field of IT, regarding the decision maker's intention for the adoption and continued through the development of a theoretical framework that identifies the key factors for the adoption of e-waste and intention continuance.
Background: Acne vulgaris is one of the top three most commonly encountered dermatological problems worldwide in both primary and secondary care. Human keratinocytes express functional TLR2 heterodimers. An increased expression of TLR2 was detected in the epidermis of inflammatory acne lesions, as observed in normal skin; the expression level increased with the degree of differentiation of the keratinocytes. TLR2 expression is upregulated in inflammatory acne lesions and induced by C. acnes. The current study conducted to assess the oral isotretinion treatment effect on the acne vulgaris patients by evaluated the Toll Like Receptor 2 as a major immune system marker in Acne vulgaris immune re
... Show MoreFungi produce a series of toxic compounds on corn, especially Fumonisin B1 (FB1) toxin produced by Fusarium spp. and promoting cancer activity in humans and animals. This study aimed to the isolation and identification of fungi associated with local corn seeds and the detection for the presence of FB1 by using ELISA technique. Thirty samples of corn ears were collected from silos and markets in Baghdad city during the period from November 2018 to March 2019. The present study found that Fusarium was the dominant isolate among fungi in terms of the relative density 57.07%, followed by Aspergillus 31.17%, Rhizopus 3.36%, Alternaria 2.88%, Mucor 2.16%, Penicillium 1.92%, Trichothecium 0.96%, and Helminthosporium 0.48%. FB1 was detected in a
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe identification and sequencing of Amyloid Precursor Protien (APP) and presenilin (PS) opened the door for the engineering of transgenic mouse models to study pathogenic mechanisms of Alzheimer Disease (AD). The first successful mouse models over-expressed human APP with an Familiar AD (FAD) linked mutation in the brain. These mice exhibit Aß plaques, neuron loss, dystrophic neurites, inflammatory responses, learning impairments and deficits in synaptic transmission and/or long-term potentiation. The genotypes of all offspring of APP/PS1 mutant mice are analysed by Polymerise Chain Reactions. Generally there are two possibilities to analyse the DNA. The First, primers for APP or PS1 was used separately assuming that both genes are int
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1