Abstract
The aim of the current research is to identify the Effect of the alternative evaluation strategy on the achievement of fourth-grade female students in the subject of biology. The researchers adopted the zero hypothesis to prove the research objectives, which is there is no statistically significant difference at the level (0.05) between the average scores of the experimental group who study according to the alternative evaluation strategy and the average scores of the control group who study in accordance with the traditional method. The researchers selected the experimental partial adjustment design of the experimental and control groups with the post-test. The researchers intentionally selected (Al-fed
... Show More: The aim of this research is to investigate the impact of Woods ' strategy in collecting second graders average for physics. To achieve the objective researcher coined the following hypothesis: there was no statistically significant difference at a level (0.05) between the average grades of the experimental group students studying physics as Woods and strategy between the average control group students who are studying the same article in the regular way. Test collection. Search sample amounted to (83) students and (42) students for the experimental group, and (41) students for the control group. Students were subjected to test experiment is composed of (30) after the completion of the experiment. And use appropriate statistical methods re
... Show MoreLeishmania major is a protozoan parasite that causes cutaneous Leishmaniasis disease in human beings and animals. The disease is prevalent in tropical and semitropical countries and has great health importance. The present study aimed to identify the histological changes in the organs infected with L. major and to provide a sophisticated diagnostic method for infection through detecting TGF-β cytokine by immunohistochemistry technique(IHC) from October 2020 to January 2021. A total of 40 samples of paraffin blocks were used for different organs including skin, spleen, liver, kidney, and heart of male and female BALB/c mice, aged 6-8 weeks, which were previously infected subcutaneously with L. major promastigotes at a dose of 1×107 promast
... Show MorePhlebotomus papatasi sand fly is the main vector of Zoonotic Cutaneous Leishmaniasis (ZCL) in Iraq. The aim of this study was to assess and predict the effects of climate change on the distribution of the cutaneous leishmaniasis (CL) cases and the main vector presently and in the future. Data of the CL cases were collected for the period (2000-2018) in addition to sand fly (SF) abundance. Geographic information system, R studio and MaxEnt (Maximum entropy niche model) software were used for analysis and predict effect of (elevation, population, Bio1-19, and Bio28-35) on CL cases distribution and SF occurrence. HadGEM2-ES model with two climate change scenarios, RCP 4.5 and RCP 8.5 were used for future projections 2050. The results showed th
... Show MoreThis research dealt with the subject of negotiation skills of employees in public relations departments which is one of many skills supposed to be available to these employees. These skills combined help in the success of the job of public relations departments; and give them an important and vital role within the roles distributed in the departments of any government institution wither is governmental or non-governmental.
Negotiation is a skill that requires intelligence, tact, culture, information, intuition, and knowing to use the means of communication to access the information that is useful in reaching satisfactory results
... Show MoreThis article suggests and explores a three-species food chain model that includes fear effects, refuges depending on predators, and cannibalism at the second level. The Holling type II functional response determines food consumption between stages of the food chain. This study examined the long-term behavior and impacts of the suggested model's essential elements. The model's solution properties were studied. The existence and stability of every probable equilibrium point were examined. The persistence needs of the system have been determined. It was discovered what conditions could lead to local bifurcation at equilibrium points. Appropriate Lyapunov functions are utilized to investigate the overall dynamics of the system. To support the a
... Show MoreBackground: Dental implants are a suitable option for the replacement of some or all missing teeth. The successful insertion of a biocompatible material into living tissue with little to no evidence of rejection has revolutionized medicine and dentistry. An increase in bone response was observed with local administration of growth hormone around dental implants. Growth hormone may act as a bone stimulant in the placement of endosseous dental implants and enhances osseointegration. The aim of the study was to evaluate immunohistochemically the effect of the topical application of growth hormone on the osseointegration of cpTi implant. Materials and Methods: Eighty titanium screw implants were inserted in the tibia of the forty adult rabbits.
... Show MoreBackground: Coronavirus disease 2019 (COVID-19) is an emerging zoonotic disease caused by the new respiratory virus SARS-CoV2. It has a tropism in the lung tissues where excess target receptors exist. Periostin plays a role in subepithelial fibrosis associated with bronchial asthma. Since the Coronavirus's target is the human respiratory system, Periostin has been recently described as a valuable new biomarker in the diagnosis and evaluation of disease in patients with COVID-19 lung involvement. Objectives: To assess the level of Periostin in the serum of COVID-19 patients and to correlate its role in disease severity and prognosis. Subjects and Methods: Periostin serum levels were measured for 63 patients attending three main COVID
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More