Vaccination is a vital cornerstone of public health, which has saved countless lives throughout history. Therefore, achieving high vaccination uptake rates is essential for successful vaccination programs. Unfortunately, vaccine uptake has been hindered by deferent factors and challenges. The objective of this study is to assess COVID-19 vaccine uptake and associated factors among the general population.
This study is a descriptive cross-sectional study conducted in Basmaia city, Baghdad from June to October 2022. Data were collected through a semi-structured questionnaire using multi-stag
This paper discussed the solution of an equivalent circuit of solar cell, where a single diode model is presented. The nonlinear equation of this model has suggested and analyzed an iterative algorithm, which work well for this equation with a suitable initial value for the iterative. The convergence of the proposed method is discussed. It is established that the algorithm has convergence of order six. The proposed algorithm is achieved with a various values of load resistance. Equation by means of equivalent circuit of a solar cell so all the determinations is achieved using Matlab in ambient temperature. The obtained results of this new method are given and the absolute errors is demonstrated.
Studied the effect of foliar fertilizers Alaongrin results showed that spraying fertilizer Alaongrin and Fertilizers and Ministry of Agriculture and rack licorice extract every three weeks after thirty days from planting seedlings
One and two-dimensional hydraulic models simulations are important to specify the hydraulic characteristics of unsteady flow in Al-Gharraf River in order to define the locations that facing problems and suggesting the necessary treatments. The reach in the present study is 58200m long and lies between Kut and Hai Cities. Both numerical models were simulated using HEC-RAS software, 5.0.4, with flow rates ranging from 100 to 350 m3/s. Multi-scenarios of gates openings of Hai Regulator were applied. While the openings of Al-Gharraf Head Regulator were ranged between 60cm to fully opened. The suitable manning roughness for the unsteady state was
... Show MoreThe Cassia glauca Lam. is the tree that belongs to the Fabaceae family and is native to India has many uses in indigenous systems of medicine, folk medicine, and traditional Brazilian medicine. Has many pharmacological activities such as anti-diabetic, antibacterial, antifungal, antioxidant, anti-hemolytic, anticancer, cardio-protective, and Hepato-protection. The aim of study is to Isolation, identification, and quantification of some compounds from aerial parts of Cassia glauca since no phytochemical investigation had previously been done in Iraq for this plant. The aerial parts were defatted in n. hexane for 48 hours. The defatted materials were extracted in 85% ethanol using the hot method (soxhlet), then the extract was fra
... Show MoreThe artistic process operates whether in general in all arts or specifically in one type of arts or one of the genres of arts types on the preoccupations of the pressing artistic references as the founder of the artistic work in the material formulations on the one hand and on the other hand as a translator to understand the artistic achievement in general and plastic art in particular and for the importance The researcher chose the title of her research tagged (the preoccupations of the pressing reference and its impact on the formations of postmodern arts).
The first chapter of the methodological framework deals with the problem of research, importance, objective, limits, and then terminology and its definition, and then the secon
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show More