The goal of current research to the definition of environmental awareness in the curriculum and its role in sustainable environmental planning, was the research community official regular educational schools (kindergarten, primary, secondary) for the province of Baghdad - Iraq, the sample consisted search of (100) teacher and a teacher, and what research was descriptive analytical, researchers have selected the right tool for the research procedures (closed) questionnaire, distributed to the research sample, has been used by researchers appropriate statistical methods for procedures including: the weighted average extraction unit paragraph, and Pearson equation does not extraction reliability coefficient, and research found several conclusions from them : - the weakness of the curriculum that dealt with environmental awareness and environmental education in the relevant subject textbooks.
Densities ρ and viscosities η for several concentrations of amino acids (Serine, Cysteine and Threonine) at different temperatures (298.15, 303.15 and 308.15K) have been measured. On the basis of these data, the apparent molal volumes v , partial molal volumes at infinite dilution v , slope Sv , Gibbs free energy of activation for viscous flow of solution ∆G1,2 and Jones – Dole Bcoefficients were calculated the nature of solute-solvent and solute-solute interactions have been discussed in terms of the values of v , v , Sv and B-coefficents
Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreThe main aim of the current research is to focus the light on some bacterial contamination on cracked eggshell and egg content plus studying the sensitivity of these bacterial isolates to antibiotics. For this purpose, a total of 50 eggs were collected from the markets in Baghdad city (Iraq) and examined for bacterial isolation from cracked eggshells and from the egg contents. The bacterial isolates were cultured and purified then transferred to a specific media to study its sensitivity against antibiotics. The results revealed that bacteria isolated from both cracked eggshells (46%) and egg contents (44%). The bacteria isolated include E. coli, Staphylococcus, Enterococcus faecalis, Enterobacter and Pseudomonas. The results of antibiotic s
... Show MoreThe results of the current study showed that the thyroid gland in adult domestic cat (Felis catus) is located in the neck area on both sides of the trachea at rings (1-5). The gland consists of two lobes (right and left) and it is surrounded by a capsule of connective tissue consisting of two outer and inner layers, and a layer of fatty tissue overlaps with the outer layer of the capsule. In addition, the results of this study found that the histological structure of the thyroid gland is composed of several follicles that appear in different sizes and shapes; the follicles are lined with simple cuboidal epithelial tissue and sometimes appear lined with high and low simple cuboidal epithelial tissue. The gland is histologically composed of t
... Show MoreIn this research, the effect of the rotation variable on the peristaltic flow of Sutterby fluid in an asymmetric channel with heat transfer is investigated. The modeling of mathematics is created in the presence of the effect of rotation, using constitutive equations following the Sutterby fluid model. In flow analysis, assumptions such as long wave length approximation and low Reynolds number are utilized. The resulting nonlinear equation is numerically solved using the perturbation method. The effects of the Grashof number, the Hartmann number, the Hall parameter, the magnetic field, the Sutterby fluid parameter, and heat transfer analysis on the velocity and the pressure gradient are analyzed graphically. Utilizing MATHEMATIC
... Show MoreThe goal of this experimental study is to determine the effects of different parameters (Flow rate, cuttings density, cuttings size, and hole inclination degree) on hole cleaning efficiency. Freshwater was used as a drilling fluid in this experiment. The experiments were conducted by using flow loop consist of approximately 14 m (46 ft) long with transparent glass test section of 3m (9.84 ft.) long with 4 inches (101.6 mm) ID, the inner metal drill pipe with 2 inches (50.8 mm) OD settled with eccentric position positive 0.5. The results obtained from this study show that the hole cleanings efficiency become better with high flow rate (21 m3/hr) and it increase as the hole inclination angles increased from 60 to 90 degree due to dominated
... Show MoreNatural fractures provide an important reservoir space and migration channels for oil and gas reservoirs and control the reservoir potential. Therefore, it is essential to understand the methods for identifying accurate reservoir permeability and characterizing reservoir fractures. In particular, using conventional measurements to identify permeability and characterize fractures is very expensive. While using conventional logging data is very challenging, and an efficient characterization correlation method is urgently needed. In this paper, we have evaluated reservoir potential based on the sensitivity of sonic scanner tools to fluid mobility, maximum stress direction, and fractures presence. This tool provides a continuous estimat
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreObjective To highlight the main demographic characteristics and clinical profiles of female patients registered with breast cancer in Iraq; focusing on the impact of age.Methods This retrospective study enrolled 1172 female patients who were diagnosed with breast cancer at the Main Center for Early Detection of Breast Cancer/Medical City Teaching Hospital in Baghdad. Data were extracted from an established information system, developed by the principal author under supervision of WHO, that was based on valid clinical records of Iraqi patients affected by breast cancer. The recorded information regarding clinical examination comprised positive palpable lumps, bloody nipple discharge, skin changes, bilateral breast involvement, tumor
... Show More