The purpose of this study was to investigate the effect of a Cognitive- Behavioral Training Program in reducing Problems Solving among a sample of education university College Students, the study sample consisted of (50) students were randomly assigned to two groups: experimental, and control; (25) students per group, the results of (ANOVA) revealed that there were significant differences at (p < 0.05) between experimental and control group in Problems Solving level, while there were significant differences between both groups in achievement. The researchers recommended further studies on the other variables which after training students on the method of solving problems and techniques to reduce stress.
This paper is concerned with finding solutions to free-boundary inverse coefficient problems. Mathematically, we handle a one-dimensional non-homogeneous heat equation subject to initial and boundary conditions as well as non-localized integral observations of zeroth and first-order heat momentum. The direct problem is solved for the temperature distribution and the non-localized integral measurements using the Crank–Nicolson finite difference method. The inverse problem is solved by simultaneously finding the temperature distribution, the time-dependent free-boundary function indicating the location of the moving interface, and the time-wise thermal diffusivity or advection velocities. We reformulate the inverse problem as a non-
... Show MoreWireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i
... Show MoreStaphylococcus aureus is a common pathogenic agent due to its ability to cause various types of infections, ranging from mild skin infections to sever systemic diseases. One of the most virulence factors of this bacterium is its ability to from biofilms on solid surfaces by anchoring the planktonic cells and by producing a protective layer of extra polymeric substances. Biofilm formation is controlled through many genes. The most important ones are icaA and icaD. Dentures are prosthetic devices that are made of different materials to replace lost teeth. The aim of this study is to examine the ability of different types of denture materials to support the biofilm formation of S. aureus at phenotypic level by detecting ba
... Show MoreBackground: Postoperative nausea and vomiting (PONV) are one of the most common complaints following laparoscopic cholecystectomy.
Objective: This study was designed to compare the effects of dexamethasone, metoclopramide, and their combination on preventing PONV in patients undergoing laparoscopic cholecystectomy.
Methods: A total of 135 patients enrolled in the study. American Society of Anesthesiologists (ASA) physical status I and II patients were included in this randomized, double blind, placebo-controlled study. Patients were randomly assigned to group A administered 8mg iv dexamethasone, group B received metoclopramide 10 mg, group C received combination of 8mg de
... Show MoreThis paper investigates the effect of magnetohydrodynamic (MHD) of an incompressible generalized burgers’ fluid including a gradient constant pressure and an exponentially accelerate plate where no slip hypothesis between the burgers’ fluid and an exponential plate is no longer valid. The constitutive relationship can establish of the fluid model process by fractional calculus, by using Laplace and Finite Fourier sine transforms. We obtain a solution for shear stress and velocity distribution. Furthermore, 3D figures are drawn to exhibit the effect of magneto hydrodynamic and different parameters for the velocity distribution.
Background: Several pathologies of the oral cavity have been associated with stress. Dental students need to gain assorted proficiencies as theoretical knowledge, clinical proficiencies, and interpersonal dexterity which is accompanied with high level of stress. Uric acid is the major antioxidant in saliva. The aim of this study is to assess the dental caries experience among dental students with different levels of dental environment stress in relation to physicochemical characteristics of whole unstimulated saliva.
Materials and Methods: the total sample is composed of 300 dental students (73 males, 227 female) aged 22-23 years old, from collage of dentistry / university of Baghdad, from the 4t
... Show MoreAn extensive program of laboratory testing was conducted on ring footing rested on gypseous soil brought from the north of Iraq (Salah El-Deen governorate) with a gypsum content of 59%. There are limited researches available, and even fewer have been done experimentally to understand how to ring footings behave; almost all the previous works only concern the behavior of ring footing under vertical loads, Moreover, relatively few studies have examined the impact of eccentric load and inclined load on such footing. In this study, a series of tests, including dry and wet tests, were carried out using a steel container (600×600×600) mm, metal ring footing (100 mm outer diameter and 40 mm inner diameter) was placed in the m
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More