The study is concerned with the problem of the earthly identity of kindergarten children by verifying its aims in identifying the earthly identity of the first level of kindergarten children and the earthly identity of both levels of the kindergarten. The research also aims to identify the earthly identity of male and female kindergarten children. The study population is represented in public and private kindergartens on both sides of Baghdad city, Karkh & Rusafa for the academic year (2022-2023). The earthly identity test in its final form consisted of (10) items. The test was administered to a sample of (400) children in public and private kindergartens, who were selected randomly. The results showed that kindergarten children have a good earthly identity. There are no significant differences between males and females in earthly identity according to the two levels of kindergarten. The research came out with a number of recommendations and suggestions
Penetrating cardiac injuries caused by nail guns are exceedingly rare but often life-threatening, with reports showing an increasing trend. We described the case of an adolescent male who sustained accidental cardiac penetration by an iron nail while performing carpentry work. Rapid referral to a specialized cardiac center enabled timely surgical intervention, illustrating the pivotal role of early recognition, expedited transfer, and expert management in optimizing outcomes. This case also highlights the grave risks associated with the employment of minors in hazardous occupational settings, where exposure to unsafe environments may lead to catastrophic consequences.
Background: Nutritional Rickets is a condition produced by an absence of Vitamin D, calcium or phosphate. It clues to relaxing and fading of the bones. Dental expression of children with rickets contains enamel hypoplasia and delayed tooth eruption. This study was conducted in order to assess caries experience (dmfs) and enamel defects among study and control groups, and to evaluate and compare the levels of selected salivary biomarkers between children with nutritional rickets and apparently healthy children. Material and methods: Assessment of caries according to WHO in 1987, and assessment of enamel defects according to enamel defect index EDI of WHO in 1997. In addition a stimulated saliva samples were collected according to Palone e
... Show MoreThe Logic of Freezers and Animals in the Holy Quran
Stylistics represents a modern approach in understanding the literary text through the linguistic patterns that form it. The distinctive phenomena that the text includes constitute special features in it. As well as exploring its aesthetic aspects through description and analysis at the same time. The close link between stylistics and linguistics made stylistics occupy a prominent place in modern literary criticism.
In this regard, we do not want to dwell on the different directions of stylistics. Rather, we will prolong the discussion in the study of the style as a (deviation. Aversion) from the original. Because this trend plays on the chord of the paradox between the surface structure and the deep structure, especially when the sur
Explainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreBackground:sThe aims of this study were to evaluate and compare the ability of three different techniques to obdurate simulated lateral canals, evaluate the effect of the main canal curvature on obturation of lateral canals and compare the gutta-percha penetration between coronal and apical lateral canals. Materials and methods: Resin blocks with 30 straight and 30 curved were used in this study. Each canal has two parallel lateral canals. The main canal has 0.3 mm apical diameter and 0.04 taper. The canals were divided into six groups according to canal curvature and obturation techniques used (n=10): Groups C1 and C2: straight and curved canals obturated with continuous wave technique using E&Q masterTM system. Groups O1 and O2: straight
... Show MoreKE Sharquie, HR Al-Hamamy, AA Noaimi, AF Tahir, Journal of Cosmetics, Dermatological Sciences and Applications, 2012 - Cited by 2