We have investigated in this research, the contents of the electronic cigarette (Viber) and the emergence of the phenomenon of electronic smoking (vibing) were discussed, although the topic of smoking is one of the oldest topics on which many articles and research have been conducted, electronic smoking has not been studied according to statistical scientific research, we tried in this research to identify the concept of electronic smoking to sample the studied data and to deal with it in a scientific way. This research included conducting a statistical analysis using the factor analysis of a sample taken randomly from some colleges in Bab Al-medium in Baghdad with a size of (70) views where (КМО) and a (bartlett) tests have been used to test Data matching and sample sufficiency. Analytical operations were performed using the statistical application (SBSS), where (13) variables were studied. After the analysis, four basic factors were obtained. The phenomenon was explained by the values of different variations. and the Cumulative variance for the factors equal (65.219) and this good output for this phenomenon and the variance for every one of them equals the first (29.176) and the second (14.551) and The third (11.174) and the fourth (10.318) and this variance for after rotation matrix
Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreIn this work an approach has been developed to investigate the influence of surface roughness on thermohydrodynamic performance in aligned and misaligned journal bearings by considering an average flow model and deriving the shear flow factor for various roughness configurations, similar to the pressure flow factor. An average Reynolds equation for rough surfaces is defined in term of pressure and shear flow factors, which can be obtained by numerical flow simulation, though the use of measured or numerically generated rough surfaces. Reynolds, heat conduction and energy equations are solved simultaneously by using a suitable numerical technique (Finite Difference Method) to obtain the pressure and temperature di
... Show MoreThe problem of the paper focused on the role of the learning organization in the crisis management strategy, and the extent of the actual interest in both the learning organization and the crisis management and aimed at diagnosing and analyzing that and surrounding questions. The Statistical Package for the Social Sciences (SPSS) program was used to calculate the results and the correlation coefficient between the two main variables. The methodology was descriptive and analytical. The case study was followed by a questionnaire that was distributed to a sample of 31 teachers. The paper adopted a seven-dimensional model of systemic thinking that encourages questioning, empowerment, provision of advanced technologies, and strategic lea
... Show MoreThrough an experimental program of eighteen specimens presented in this paper, the bond strength between reinforcing bar and rubberized concrete was produced by adding waste tire rubber instead of natural aggregate. The fine and coarse aggregate was replaced in 0%, 25%, and 50% with the small pieces of a waste tire. Natural aggregate replacement ratio, rebar size, embedded rebar length, the rebar yield stress of rebar, cover, and concrete compressive strength were studied in this investigation. Ultimate bond stress, bond stress-slip response, and failure modes were presented. The experimental results reported that a reduction of 19% in bond strength was noticed in 50% replaced rubberized concrete compared with convention
... Show MoreBackground: intravenous regional anaesthesia (IVRA) is an effective method of producing anaesthesia of the extremities. Disadvantages are the rapid loss of anaesthesia after the deflation of the tourniquet and the rapid development of postoperative pain. It is important to search for agents with longer durations of action, better nerve fibre selectivity, lesser degrees of motor blockade and lower incidences of systemic toxicity.Objectives: This study was designed to evaluate and compare the clinical effects of intravenous regional anaesthesia, with lidocaine alone, or in a combination with ketamine and atracurium for better analgesia, and to examine the possible clinical advantages of using muscle relaxants (i.e., atracurium) with intrav
... Show MoreHypertension is a cardiovascular problem with high rates of epidemiology and risks of morbidity and mortality in the global area. Nitric oxide (NO) is one of the reactive oxygen species (ROS) that produced from L-arginine by nitric oxide synthase (NOS) enzyme. NO involves in various vital processes in human health, one of which is the modulation of vasoconstriction and relaxation of the vascular system. We have aimed to investigate the link between NO and NOS with hypertension in women. The relationship between NO and NOS, as well as the usefulness of them as indicators of hypertension risks were subjects of study in this article. The results have revealed that hypertensive women had significant (P<0.05) lower levels of NO (15.07±3.41 IU/m
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More