The researcher identified the objective of this research Do you know the impact of the way to solve problems in the achievement of the students in the fourth grade prep Islamic Education, and the researcher has identified the limits of the search, and the terms contained in the title researched and then offered the researcher previous studies relate to the subject studied, introduced Studies in Arab and foreign countries dealt with how to solve problems, the researcher identified the methodology discussed public represented by experimental method, and the sample consisted of two groups, one experimental and the other officer, and worked on the set of variables that may affect the results between the two groups in vkavot changers task, the results reached through statistical means necessary, in the light of the findings of the researcher from the results of the way to solve problems in the article about the collection made a number of conclusions focused on the effectiveness of this method in Education, and made a number of recommendations for those with their own hands the decision to invest in this effective method of education, and made a number of proposals by a number of anwanat complement to search in the current study
serum amylase occurs in cases of perforated peptic ulcer partly as a result of increase leakage of pancreatic enzymes rich fluid from the perforation site with subsequent absorption by peritoneal lymphatics & partly due to damage of pancreases by digestive enzymes that spilled through the perforation.
Objectives: To determine the significance of abnormally high level of serum amylase in patients undergone operation for PDU, to study the factors that tend to bring about elevated serum amylase level in these patients.
Patients and Methods: A prospective study of 250 patients with perforated duodenal ulcer (PDU) at al kindy teaching hospital, Baghdad, Iraq from June 2008- august 2010. patients were examined clinically and investig
The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreBack ground: Celiac disease (CD) is an immune–mediated enteropathy induced by gluten with broad spectrum of presentation, many patients with atypical symptoms or clinically silent remain undiagnosed, and are at risk of long-term complications.
Objective: The aim of the present study is to determine the of prevalence celiac disease in children with short stature.
Patient and Methods: In this prospective study, 307 children 181(58.9%)males and 126(41.1%) females ,with ages ranging from 3 to 17.5years ( mean 12.2 ±3.4) with short statures (height below 3rd percentile adjusted for age and sex) attending the consultation room of endocrinology/ Welfare Teaching Hospital/medical city- Baghdad , were enrolled in this study from the firs
Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreBackground: Lenalidomide is an immunomodulatory drug having notable anti-inflammatory, and anti-antineoplastic properties. Lenalidomide suppresses the production of pro-inflammatory cytokines that have been linked to a variety of hematologic malignancies. Lenalidomide enhances the immune system of the host by regulating T cell proliferation, which results in changes in inflammation that are related to the etiology of psoriasis.
Objectives: The objectives of this study were to determine the efficacy of lenalidomide as an ointment in treating mouse models of psoriasis as well as how it may affect TNF-α levels in skin tissue in different experimental groups.
Methods: The stud
... Show MoreConsidering the magnitude of its economic, social and political impact, unemployment represents a crucial challenge confronting the majority of the countries of the world. The problem of the study was the high rates of unemployment in Sudan and the inability of economic growth rates to keep pace with the steady increases in unemployment rates during the study period. This study aimed to identify the economic and social variables influencing unemployment rate in Sudan, in addition to measuring the impact of these variables over the period (1981-2015). Data were collected from databases of the World Bank and Atlas of the World's data .The study hypothesized the presence of statistically significant and direct relationship between u
... Show More
ملخص البحث:
ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.
اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثل
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More