The study aims budget in grades use of smart phones to individuals (sample) according variable sex (males and females) and used researcher descriptive analytical method consisted sample of (300) students have chosen the way stratified random, and the study variables (academic achievement of students, sex and the use of Smart phones) resolution was adopted as a tool for data collection. The most important results of the study that females are more commonly used for smart phones, as well as the existence of a positive relationship between the inverse statistically significant use of smart phones and the rate of school for students and the use of smart phones has a negative impact on the academic achievement of the students. So Parents should follow up their children because the children stay in their homes is no longer enough to protect them and immunized from negative variables form in which it was the case for previous generations, it may be son in his room and in the thought of parents that safety away from what may be suffered by the cons out of the house while he is browsing social networking sites. Or practiced digital games, and what they connect to the outside world without restrictions. Which requires the need to follow up their children in the Atchaaram spying on them or have confidence in them.
BACKGROUND: Many genetic factors are known to be related to osteoporosis, and currently the role of the glucagon-like peptide-1 receptor (GLP-1R) gene in bone health has been studied intensively. Some variation of this gene, such as rs1042044 and rs6458093, are known to be linked to metabolic diseases and lower bone mineral density, however their specific contribution to osteoporosis remains largely unexplored. Therefore, this study was conducted to investigate the combined genotypic effect of rs1042044 and rs6458093 as a genetic risk factor for osteoporosis in postmenopausal Iraqi women.METHODS: Blood samples from 75 osteoporosis patients and 75 healthy controls, aged 45-85, were collected. DNA was extracted, and a region of GLP-1R
... Show MoreObjectives: acute kidney injury (AKI) is a serious pathophysiology side effect of rhabdomyolysis. Inflammatory mechanisms play a role in the development of rhabdomyolysis-induced AKI. Citronellol (CT) is a naturally occurring monoterpene alcohol (3,7-Dimethyl-6-often-1-ol) found in aromatic plant species' essential oils. In this study, we explored the protective effects of Citronellol on glycerol-induced AKI.
Methods: Four groups of eight mice each (n=8) were formed by randomly dividing the animals into the groups, glycerol-induced AKI model group, low-dose CT-treated group (50mg/kg), high-dose CT-treated group (100mg/kg), and control group. The renal functions of mice from all groups were evalua
... Show MoreThe enhancement of the thermal and thermo-hydraulic performance of a semi-circular solar air collector (SCSAC) is numerically investigated using porous semi-circular obstacles made of metal foam with and without longitudinal porous Y-shaped fins. Two 10 and 40 PPI porous material samples are examined. Three-dimensional models are built to simulate the performance of SCSAC: model (I) with clear air passage; model (II) with only metal foam obstacles, and model (III) with metal foam obstacles as well as porous Y-fins. COMSOL Multiphysics software version 6.2 based on finite element methodology is employed. A conjugate heat transfer with a (k-ε) turbulence model is selected to simulate both heat transfer and fluid flow across the entir
... Show MoreThe majority of the environmental outputs from gas refineries are oily wastewater. This research reveals a novel combination of response surface methodology and artificial neural network to optimize and model oil content concentration in the oily wastewater. Response surface methodology based on central composite design shows a highly significant linear model with P value <0.0001 and determination coefficient R2 equal to 0.747, R adjusted was 0.706, and R predicted 0.643. In addition from analysis of variance flow highly effective parameters from other and optimization results verification revealed minimum oily content with 8.5 ± 0.7 ppm when initial oil content 991 ppm, tempe
In this study, manganese dioxide (MnO₂) nanoparticles (NPs) were synthesized via the hydrothermal method and utilized for the adsorption of Janus green dye (JG) from aqueous solutions. The effects of MnO₂ NPs on kinetics and diffusion were also analyzed. The synthesized NPs were characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD), energy-dispersive X-ray analysis (EDX), and Fourier-transform infrared spectroscopy (FT-IR), with XRD confirming the nanoparticle size of 6.23 nm. The adsorption kinetics were investigated using three models: pseudo-first-order (PFO), pseudo-second-order (PSO), and the intraparticle diffusion model. The PSO model provided the best fit (R² = 0.999), indicating that the adsorpti
... Show MoreThis work includes preparation of Az, Qz, and Tz derivatives from the reaction of Schiff base (Sb) derivative with anthranilic acid, chloroacetyl chloride, and sodium azide, as well as, the characterization via FT-IR, 1H-NMR, and 13CNMR. The anticorrosion inhibition of these compounds was studied and the measurements of carbon steel (CS) corrosion in sodium chloride solution 3.5% (blank) and inhibitor in solutions were calculated at a temperature range of 293-323 K by the technique of electrochemical polarization. In addition, some thermodynamic and kinetic activation parameters for inhibitor and blank solutions (Ea⋇, ΔH⋇, ΔS⋇, and ΔG⋇) were determined. The results showed high inhibition efficacy for all the prepared compounds,
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper