Cadmium has been known to be harmful to human healthy , manily Via contaminated drinking water , food supplies , tobacco and industrial pollutant . The aim of this study was to determine the toxicity of new Cadmium (II) complex ( Bis[ 5- ( P- nitrophenyl ) – ? 4 – Phenyl- 1,2,4- triazole -3- dithiocarbamatohydrazide] cadmium (II) Hydra ( 0.5) and compare it with anticancer drug cyclophosphamide ( CP) in female albino mice . This complex causes to several alterations in Enzymatic activity of Glutamate Pyruvate Transaminase (GPT) and Alkaline Phosphatase (ALP ) in three organs after the treatment of mice with different doses of a new cadmium (II) complex ( 0.09 / 0.25ml , 0.18/ 0.5ml and 0.25mg /0.7 ml /30 gm of mouse ) for three days by the decreased of Glutamate Pyruvate Transaminase activity in lung , Liver and kidney , while the Alkaline Phosphatase activity was increased in kidney , lung and liver . The results were indicated that no significant differences ( P > 0.05 ) in Glutamate Pyruvate Transaminase activity between the treatment of mice with cadmium ( II ) complex and cyclophosphamide (CP) in the liver , kidney and Alkaline Phosphatase activity in the liver at each three doses .
The study aims to identify the level of modesty and self-assertiveness among Tikrit university’s students in regard with students’ gender and major (scientific, human studies), and to identify the correlation between modesty trait and self-assertiveness of students. To this end, the researcher has designed a scale to measure modesty that consisted of four-domains (decency, avoiding of unattractive, pang of conscience, and apprehension). Moreover, the researcher adopted a scale of self-assertiveness that designed by (shawki, 1998). The sample included (600) student on first-stage at the university of Tikrit. The results revealed that students have a high level of modesty and self-assertiveness; there is a correlation between modesty t
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreAverage interstellar extinction curves for Galaxy and Large Magellanic Cloud (LMC) over the range of wavelengths (1100 A0 – 3200 A0) were obtained from observations via IUE satellite. The two extinctions of our galaxy and LMC are normalized to Av=0 and E (B-V)=1, to meat standard criteria. It is found that the differences between the two extinction curves appeared obviously at the middle and far ultraviolet regions due to the presence of different populations of small grains, which have very little contribution at longer wavelengths. Using new IUE-Reduction techniques lead to more accurate result.
This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreThis paper is concerned with the design and implementation of an image compression method based on biorthogonal tap-9/7 discrete wavelet transform (DWT) and quadtree coding method. As a first step the color correlation is handled using YUV color representation instead of RGB. Then, the chromatic sub-bands are downsampled, and the data of each color band is transformed using wavelet transform. The produced wavelet sub-bands are quantized using hierarchal scalar quantization method. The detail quantized coefficient is coded using quadtree coding followed by Lempel-Ziv-Welch (LZW) encoding. While the approximation coefficients are coded using delta coding followed by LZW encoding. The test results indicated that the compression results are com
... Show MoreThe research aims to identify the level of functional engagement and hope-based thinking of kindergarten teachers, identify if there is a significant difference in functional engagement and hope-based thinking in terms of specialization and years of service for kindergarten teachers, identify if there is a significant correlation between functional engagement and hope-based thinking of kindergarten teachers. The current research is determined by kindergarten teachers in the Second Rusafa Baghdad Education Directorate for the academic year (2022-2023). In order to achieve the objectives of the research, the researcher prepared a functional engagement scale, which consists of (45) items in three areas: Perceptual and functional engagement
... Show MoreThe steel jetty selected for strengthening is in Baghdad city, over Tigris River, consists of 55 short spans, each of approximately 4 meters and one naviga-tional opening of 12 m. The bridge is 224 meters length and 8 meters in width. The strengthening system was designed to remove overstresses that occurred when the bridge was subjected to abnormal loads of 380 tons. A strengthening system which installed in spring 2008 was used where the main concept is to depend on added side supporting elements which impose reversal forces on the bridge to counteract most of the loads expected from the abnormal heavy loads. The bridge was load tested before and after the strengthening system was activated. The load test results indicate that the strengt
... Show MoreDie Forschung geht um das wichtigste Thema für die literarischen Studien, die um die literarische Übersetzung und die Deutlichkeit dem Leser gekreist sind. Die literarische Übersetzung ist ein schwieriger Prozess, der auf vielseitigen Faktoren beruht ist, damit es erfolgreich gelungen ist. Dies ist auch ein gemeinsamer Prozess durch das Kunstwerk zwischen dem Autor und Übersetzer, so dass der erste Schritt in der vorliegenden Forschung wie folgendes lautet: muss es der Autor genau bestimmt wird, wie er die methodischen Grundprinzipien des Wekes im Dienst der zentralen Idee formuliert, und wie er die literarische Gestalt durch die voll erfassende Vorstellung des Wekes dichtet. Denn die literarische Arbeit besteht aus zwei Teilen
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreForeign direct investment (FDI) has been viewed as a power affecting economic growth (EG) directly and indirectly during the past few decades. This paper reviewed an amount of researches examining the relationships between FDI and EG, especially the effects of FDI on EG, from 1994 up to 2012. The results show that the main finding of the FDI-EG relation is significantly positive, but in some cases it is negative or even null. And within the relation, there exist several influencing factors such as the adequate levels of human capital, the well-developed financial markets, the complementarity between domestic and foreign investment and the open trade regimes, etc.