This research aims at measuring the relationship between moral intelligence and academic adjustment for sixth year primary School Pupils.
The research is assigned to sixth year primary school pupils- Baghdad –the 2nd karkh of the both genders .The total sample includes (500) pupils .The researchers has built two scales one for Moral Intelligence and another for Academic Adjustment and applied them on the total sample of the research .The researchers treated data by appropriate statistical means .The research has reached the following results:
- The pupils of sixth year primary school characterized by Moral Intelligence.
- The
Background: Childhood meningitis is a major
cause of morbidity and mortality, Hemophilus
influenza b (Hib) is the most common cause in
many countries, especially below 5 years and
before the development of conjugated Hib vaccine,
it is followed by Streptococcus Pneumonia, and
then N. meningitides, in addition to other
microorganisms.
Objective: To identify the causative organisms
of bacterial meningitis and to identify the factors
predisposing significantly to the incidence of
bacterial meningitis.
Method: This cross sectional , study was done in
Al-Elwia Pediatric Hospital during the period 1st
of January 2007 to 30th of June 2007.Eighty four
patients with presumptive diagnosis of meningitis<
The drones have become the focus of researchers’ attention because they enter into many details of life. The Tri-copter was chosen because it combines the advantages of the quadcopter in stability and manoeuvrability quickly. In this paper, the nonlinear Tri-copter model is entirely derived and applied three controllers; Proportional-Integral-Derivative (PID), Fractional Order PID (FOPID), and Nonlinear PID (NLPID). The tuning process for the controllers’ parameters had been tuned by using the Grey Wolf Optimization (GWO) algorithm. Then the results obtained had been compared. Where the improvement rate for the Tri-copter model of the nonlinear controller (NLPID) if compared with
This research is dealing with five sample of tomato ketchup products available in local market that were respectively as follows: Hello-Baghdad Iraq, Tiffany-Abu Dhabi, Melody-Dubai, Baidar-Saudi Arabia, and Altunsa-Turkey. Also it is dealing with four sample of sauce products available in local market that were respectively as follows: Hello-Baghdad, Iraq, Al-Badawi-Baghdad Iraq, Family-Baghdad, Iraq, and Hala-Amman Jordon. Analysis was performed on each sample three times and mean of the reading was taking. Samples were tested through terse and shorthand from lengthened steps. The spectrophotometric method used rely on theoretical and practical bases in extraction and diagnosis by UV spectrophotometer. This method in short notes, consiste
... Show MoreBackground: Women with previous two or
more caesarean deliveries are usually
managed by elective cesarean section to avoid
the possible risks of labor.
Objective: To compare the relative risks of
maternal and fetal outcomes in emergency
versus elective previous two or more
caesarean deliveries
Design: Randomized prospective clinical
study
Setting: Al-Elweya Maternity Teaching
Hospital, from 1st of March to 31st of
September 2008.
Methods: The study groups, those who had
previous two or more caesarean deliveries,
were included from the hospital admissions.
The 1st group (102 women) presented in labor
and was managed by caesarean delivery as
soon as it was possible. The second group (7
Ficus (FIC) leaf extract used as corrosion inhibitor for carbon steel alloy (C.S) in two corrosive environments (saline and acidic) with four concentrations (1, 2, 3 and 4 ppm) at varied temperature range between (298-328 K) using electrochemical polarization measurements. The importance of this work focused on the use the green chemistry that is far from the chemical materials effect. The results of polarization presented the FIC inhibitor consider a mixed type (anodic and cathodic) inhibitor. Tafel curve used to evaluate the corrosion inhibition activity. In a saline medium, the best inhibitor efficiency reaches to (87%) in 2 ppm and IE% reach to (99%) for HCl medium inhibited by 1ppm. Langmuir isotherm obeys the study by thermodynamic pa
... Show MoreBaylisascaris procyonis is a helminth parasite of raccoons Procyon lotor and represents a health concern in paratenic hosts, including humans and diverse domestic and wildlife species. In North America the helminth is expanding its geographic range. To better understand patterns of infection in the Ozark region of the USA, raccoons (n = 61) were collected in 2013-2014 from five counties in Missouri and Arkansas, USA and necropsied. We documented B. procyonis in all surveyed locations. The overall prevalence of B. procyonis was 44.3 % (95 % CI = 31.9 - 57.4) and was significantly higher in females than males. There were also significant differences in prevalence among raccoons sampled
Citric acid is an essential ingredient for the manufacture of (12) key industrial chemicals. Citric acid use is increasing steadily with a high annual growth rate as a result of the development of ever more sophisticated applications. Citric acid is widely utilized in the food and pharmaceutical industries due to its low toxicity when compared to other acidulous. Other uses for citric acid can be found in cleaning supplies and detergents. Based on information from a review of the literature, Citric acid production substrates and methods for surface fermentation, submerged fermentation, solid-state fermentation, and international market expansion are all covered in the current review study. Finally, there is still much to learn about the
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More