The mechanism for selecting the President of the Republic and his constitutional powers under the Constitution of the Republic of Iraq
60 patients diagnosed as having urticaria were included in the study ; 30 patients were effected with acute urticaria and 30 patients were affected with chronic urticaria. In addition, 30 healthy adult volunteers were selected as control group .The patients and control groups sera were examined with enzyme linked immunosorbent assay ( ELISA) to detect total level IgE and radial immunodiffusion (RID) to detect levels of IgG , IgA and IgM . The total level of IgE in acute urticaria ( 1.45±0.13) IU/mL and chronic urticaria (2.12 ± 0.10) IU/mL patients were significantly higher than the control groups ( 0.85 ± 0.10)IU/mL (p<0.05). The level of IgG in acute urticaria ( 12.5± 0.42) g/L and chronic (13.16±0.40) g/L patients , IgA in acute (2.
... Show MoreAbstract:
Objective (s): This study aims to assess nurses' knowledge and practice regarding physiotherapy protocol at intensive care units
Methodology: descriptive cross-sectional study design executed at the ICU in the city hospitals of AL- for the time of 13th October/ 2021 to 7th April /2022. Questionnaire filled by 75 nurses who work in ICU who had chosen by non-probability (purposive) selection collected the data. Then the researcher used an observational checklist to evaluate nurses’ practice. The data was analyzed using descriptive statistics and SPSS.
Results: the study found a deficit in nurses’ knowledge and pra
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreThis study focused on the synthesis of novel polymers incorporating the 1,3,4-oxadiazole ring. Four polymers were specifically prepared by blending polymers (6-9) with polyvinyl alcohol (PVA) in defined ratios, resulting in the formation of blended polymers (10-13). The synthesized polymers were characterized using Fourier Transform Infrared (FTIR) spectroscopy and proton nuclear magnetic resonance (1H-NMR). The results showed that the structure aligned with the proposed synthetic polymers. Furthermore, the physical and thermal properties were studied using scanning electron microscopy (SEM), thermogravimetric analysis (TGA) and Differential Scanning Calorimetry (DSC). Additionally, the biological activity was examined against two s
... Show MoreThe current research aimed to identify the level of moral identity and social affiliation among students exposed to shock pressures, as well as to reveal the relationship between these variables. To achieve these objectives, the researcher adopted the diagnostic tool for the measure of post-traumatic stress disorder (PDS-5) scale (Foa, 2013) translated to Arabic language by (Imran, 2017). The researcher also adopted the moral identity scale built by (Al-Bayati, 2015) and the measure of social affiliation built by (Al-Jashami, 2013), which were applied to a random sample of (200) male and female students chose from al Anbar University. They were exposed to shock pressures. The results of the research showed that the sample has an average
... Show MoreThe purpose of this research is to investigate the impact of corrosive environment (corrosive ferric chloride of 1, 2, 5, 6% wt. at room temperature), immersion period of (48, 72, 96, 120, 144 hours), and surface roughness on pitting corrosion characteristics and use the data to build an artificial neural network and test its ability to predict the depth and intensity of pitting corrosion in a variety of conditions. Pit density and depth were calculated using a pitting corrosion test on carbon steel (C-4130). Pitting corrosion experimental tests were used to develop artificial neural network (ANN) models for predicting pitting corrosion characteristics. It was found that artificial neural network models were shown to be
... Show MoreCleft / palate is one of the common congenital deformities in craniofacial region, associated with different types of dental anomalies like (Tooth agenesis, impaction, and supernumerary teeth) with marked changes in palatal dimensions. This study aimed to determine the prevalence of teeth agenesis and dental anomalies in cleft lip/palate patients using CBCT, and to compare the palatal dimension of cleft group with control subjects. Twenty-eight cleft cases collected during the period from 2015 to 2022, CBCT images evaluated, the study sample classified into two groups (14 bilateral and 14 unilateral cleft lip/palate) and the non-cleft control group (14 CBCT images). The presence of dental anomalies was assessed in relation to clef
... Show MoreAtmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geom
... Show MoreWith occurrence of any financial crises, regardless at global or regional levels such as the great economic crises during 1929 – 1933 and the Asian financial crises at the end of twentieth century as well as the current global financial crises that started during second half 2008, we acknowledge that there are some critics loudly articulated accusing accountants and auditors for disparences, and they are numerical partner of financial manipulation as well as corrupted administrators with the company's administrators that they are difficulty. At this point, many suggestions and recommendation for upgrading the accounting system has been made.  
... Show More