The research aimed at identifying the reality of electronic marketing in elite athletes. The researchers used the descriptive method on (193) athletes from different sports; individual and team. Direct questions and an electronic marketing scale were applied to conclude that athletic shows come first in most bought goods. The results showed that there is a difference between direct and electron shopping in favor of direct shopping. In addition to that, the results showed that sports federations do not provide athletes with proper apparels and equipment thus placing financial burdens on the athlete. Finally, the researchers concluded that language was not a barrier in electronic shopping, lack of safety and trust was the main barriers for athletes in electronic shopping.
Papillary thyroid carcinoma (PTC) represents the most prevalent kind of thyroid gland cancer, making up around 80% of all occurrences of thyroid cancer. Evidence shows that Syndecan-1 (SDC-1) expression is lost in a number of benign and malignant epithelial neoplasms, although its expression profile in thyroid gland neoplasms is yet unknown. Therefore, the aim of this study was to assess SDC-1 expression in papillary thyroid carcinoma patients, as well as the relationship between age and gender and SDC-1 expression. To undertake a detailed investigation of SDC-1 in normal and malignant tissues, tissue sections were used to examine SDC-1 expression in 70 tissue samples, 50 distinct PTC (6 males and 44 females) and 20 normal tissue ty
... Show MoreA literary text is not void of the use of the ego and the other while speaking or in a spoken communication. Such a usage is apparently outstanding in Arabic literature, and it reflects society in all its various cultural, social and political conditions. Therefore, the ego is one of the prominent concepts on which human personality is built, and its role in the formation of society and in communicating among all human societies. Accordingly, the present paper aims to clarify the duality of the ego and the other, where the ego starts from the poet himself to expand the circle of subjectivity by including his family, society, immediate surroundings, race and his religion. The other, on the other hand, that is separated from the poet,
... Show MoreThis review delves deep into the intricate relationship between urban planning and flood risk management, tracing its historical trajectory and the evolution of methodologies over time. Traditionally, urban centers prioritized defensive measures, like dikes and levees, with an emphasis on immediate solutions over long-term resilience. These practices, though effective in the short term, often overlooked broader environmental implications and the necessity for holistic planning. However, as urban areas burgeoned and climate change introduced new challenges, there has been a marked shift in approach. Modern urban planning now emphasizes integrated blue-green infrastructure, aiming to harmonize human habitation with water cycles. Resil
... Show MoreCommercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More