Experienced economic environmentRadical changes at the end of the last century and the beginning of the present century, resulting in new concepts and expectations in all aspects of economic, political, social and even behavioral.Each of these concepts is the result of rapid developments in the intangible space. Competition is no longer limited to the mere possession of tangible material resources, but because of its link to knowledge and technology content and to the comprehensive quality standards and efficient and effective policies of States. With the increasing pace of growth and interdependence among the global economies, this resulted in the birth of a new economic system led by technological development and financial liberalization. This led to digitization in all fields-economic, social and environmental and advanced countries reached the highest levels of development in various fields, especially in the ICT sector. Compared to other economies, which will meet the requirements of sustainable development with all its objectives.
Therefore, this study sought to review what is currently known in order to develop the definition of digitization and distinguish it from the digital economy and to assess the size of their development and determine their scope, and to stand on the structure of digitization of economic and knowledge of the most important objectives and assistance. And how to use digitization in achieving the goals of sustainable development, using the inductive method to analyze some of the initiatives of Dubai in digitization, which accelerated the pace of access to sustainable development.
The inductive analysis showed that the economy based on harnessing modern technology to achieve sustainable development is a growing trend towards the prospects of global integration towards a global economy. Dubai's adoption of digitization has contributed to the exclusion of the UAE from the state of isolation experienced by most Arab countries. Seeking to keep pace with developed economies.The study suggested that research and innovation should be encouraged in the field of supporting sustainable development through the use of information technology and digital technology and increasing digital transformation in manufacturing industries, with the adoption of skilled labor in employment, which will be reflected in the increase in gross domestic product and the high standard of living and environmental sustainability.
Skin drug administration is the method used to provide drugs for local or systemic therapy, which is recognized for clinical usage. It is the third-largest method of medication delivery, after only intravenous administration and oral administration. Using a transdermal delivery method makes the administration easy, and blood concentration and adverse effects can be reduced. A microneedle is a micron-sized needle with a short height of no more than 500 micrometers and a width of no more than 50 micrometers. The needle comes into contact with the epidermal layer of the skin before it gets to the dermal layer, where there is no discomfort. Several materials, such as metals, inorganic, and polymer materials, are used to create microneed
... Show MoreBackground: Gastroesophageal reflux disease, is a quite prevalent gastrointestinal disease, among which gastric content (excluding the air) returns into the oral cavity. Many 0ral manifestations related t0 this disease include tooth wear, dental caries also changes in salivary flow rate and pH. This study was conducted among gastroesophageal reflux disease patients in order to assess tooth wear in relation to salivary flow rate and pH among these patients and the effect of gastroesophageal reflux disease duration on this relation. Materials and methods: One hundred patients participate in this cross-sectional study for both genders and having an age range of 20-40 years old, patients had been endoscopically identified as having gastroeso
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show More In this paper the research represents an attempt of expansion in using the parametric and non-parametric estimators to estimate the median effective dose ( ED50 ) in the quintal bioassay and comparing between these methods . We have Chosen three estimators for Comparison. The first estimator is
( Spearman-Karber ) and the second estimator is ( Moving Average ) and The Third estimator is ( Extreme Effective Dose ) . We used a minimize Chi-square as a parametric method. We made a Comparison for these estimators by calculating the mean square error of (ED50) for each one of them and comparing it with the optimal the mean square
Background: Osteoporosis is a skeletal defect manifested by a reduction of bone strength as a result of reduced bone mass to the extent that there is a higher risk of fracture even on minor trauma. Hysterectomy in a premenopausal woman is a well known cause of ovarian failure resulting in an increased risk of osteoporosis.
Objective : To clarify bisphosphonate's preventive effect on osteopenia and osteoporosis in premenopausal women after hysterectomy.
Type of the study: Cross –sectional study.
Method: 84 premenopausal females post hysterectomy aged between 40 – 50 years, were enrolled in this randomized controlled double blinded trail a
... Show MoreBackground: The vertical distance between the upper and lower incisal edge of the central incisors when the mouth is opened as wide as possible is called maximum mouth opening (MMO). Any pathological change in the masticatory system had a direct effect on the maximal mouth opening. The aim of this study was to evaluate the relationship between the maximum bite force and the maximum mouth opening among group of children. Materials and methods: Four hundred children of both genders were included in this study, their age ranged from eight to ten years. Anterior and posterior (right, left) bite force were measured using bite force sensor. Maximum mouth opening was evaluated by electronic digital caliper. Data was statistically analyzed
... Show MoreThe present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) imp
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More