The entrance process re-engineering one of the main entrances of administrative and technology appropriate to keep pace with scientific progress and the continuing changes in business environment and for the purpose of achieving the goal sought by the organizations in the pursuit of rapid developments and renewable energy in the market competition by changing its operations and activities of the radical change which contributes to an effective contribution to reducing the cost of product or service taking into account the quality improvement in the management of change to keep the increase value and speed of placing on the market to meet customer needs and desires to achieve a
... Show MoreThe research aims to identify the current (after the readings in the collection of foreign
students to the geographical material) To achieve this, the researcher developed the following
null hypothesis:
No statistically significant differences at the level of (0.05) between the average scores who
are studying the use of article readings and the average external degree students who are
studying material in the traditional manner of collection.
The researcher has chosen Qsidia middle school Amma, which includes six divisions for
Grade average, randomly selected Division (a) to represent the control group, while
representing the Division of (c) the experimental group and reached the research sample (44)
student, b
يتناول البحث شخصية شعرية وأدبية فذة هو محمد صالح بحر العلوم الشاعر العراقي المعروف والمولود في بيت ثوري من بيوتات النجف المعادية للاستعمار البريطاني في مطلع القرن العشرين، وينحدر من أسرة عريقة مشهورة بالعلم والأدب، عاش بحر العلوم شاعراً ينقل بصوره الجمالية كل ما يقع في حواسه، وتجربته تثري من اتصاله ببيئته فنجد الشاعر اشبه بالمصور يستمد صوره من واقع بيئته المتنوع. ونحن في بحثنا هذا نحاول أن نرصد أهم المصادر
... Show MoreMultiple eliminations (de-multiple) are one of seismic processing steps to remove their effects and delineate the correct primary refractors. Using normal move out to flatten primaries is the way to eliminate multiples through transforming these data to frequency-wavenumber domain. The flatten primaries are aligned with zero axis of the frequency-wavenumber domain and any other reflection types (multiples and random noise) are distributed elsewhere. Dip-filter is applied to pass the aligned data and reject others will separate primaries from multiple after transforming the data back from frequency-wavenumber domain to time-distance domain. For that, a suggested name for this technique as normal move out- frequency-wavenumber domain
... Show MoreThis paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreCiprofloxacin is widely used in treating adults infected with Gram-negative bacteria. It is contraindicated in children, growing adolescents and during pregnancy due to joint toxicity. Its toxicity concerning other organs needs to be clarified. Thus, this study was designed to study the possible cardiac damage induced by two selected doses of ciprofloxacin in juvenile rats.Eighteenth healthy juvenile rats (4 weeks old and their weight 30 ± 2 gm) were utilized in this study and divided into three groups. Group-I control; group II and group III, respectively injected IP with 25 mg/kg and 50 mg/kg ciprofloxacin every 12 hours for one week. Serum enzymes activities alanine aminotransferase (ALT), aspartate aminotransferase (AST), cr
... Show MoreAsthma is a chronic respiratory disorder in which immunological and structural cells play a role. The limits of conventional medicines necessitate the development of innovative therapeutic techniques for asthma. In the present study, we investigated the possible protective effect of cinnamic acid (CA) on ovalbumin-induced asthma in a mouse model. Sixty albino male mice BALB/c type weighing (20-30) grams were chosen at random and divided into five groups each one contains 12 animal: Group I: PBS/liquid paraffin control. Group II: asthma model group. Group III: cinnamic acid control group; mice received cinnamic acid (50 mg/kg) in liquid paraffin orally by gavage. Group IV: asthma model / group of (25 mg / kg) cinnamic acid; mice received
... Show MoreIn this reserch Some new substituted and unsubstituted poly imides compounds. were synthesized by reaction of acrylol chloride with different amides (aliphatic and aromatic) in a suitable solvent in the presence amount triethyl amine (Et3N) with heating. The Structure confirmation of all polymers were confirmed using FT-IR,1H-NMR,13C-NMR and UV spectroscopy. Thermal analysis (TG) for some polymers showed their thermal stabilities. Other physical properties including softening points, melting point and solubility of the polymers were also measured
Ciprofloxacin, which is a second generation of fluoroquinolone and one of the most effective and widely used drugs within fluoroquinolone. Unfamiliar adverse effects of ciprofloxacin such as bone marrow (BM) suppression, thrombocytopenia, anemia, agranulocytosis, renal failure, and others observed. Lutein, is a xanthophyll (an oxygenated carotenoid), was focused by most studies as it has a strong antioxidant activity in vitro; and also, it has been associated with reducing the risk of the age-related disorders. The current study was designed to describe the role of apoptosis through the measurement of Bcl-2 associated X protein (Bax) marker, as mechanisms of bone marrow toxicity induced by ciprofloxacin and to find whether lutei
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More