Active Learning And Creative Thinking
Polyaniline (PANI) has been prepared by the oxidation method in order to fabricate it with various concentrations of copper nanoparticles (CuNPs) which produced using the reduction method. Various techniques have characterized pure PANI and PANI doped CuNPs composites, such as fourier transform infrared spectroscopy (FT-IR), X-ray diffraction spectroscopy (XRD), field emission scanning electron microscopy (FE-SEM) and energy dispersive X-ray spectroscopy (EDS), which were provided important information about the structure and morphology of the fabricated polymer nanocomposites. The properties of dielectric permittivity (έ), dielectric loss (ἔ) and electrical conductivity (σ_AC) properties were studied at room temperature versus a range
... Show MoreBackground: The presence of cancer has a profound psychological impact on the quality of life of patients and their families, on family and social relationships, and on role functioning.
Aim of the study: Assess the impact of childhood cancer on patients and their families.
Subjects and methods: A Prospective questionnaire-based study, for 151 patients, had malignancy identified by tumor registry of Children Welfare Teaching Hospital. The information was taken from the parent(s) in the presence of the patient who sometimes answered some questions during the interview.
Result: There was an interview with 151 families of children with cancer in t
... Show MoreJoseph Curtis wrote in his book (Introduction to Semiotics narrative and rhetoric) on the development of a semiotic project in exploring the meaning of communion. The book is rich in theoretical and analytical benefits both in the approach of texts and in the pursuit of letters in search of mechanisms of scriptural and scriptural generation and mechanics in narrative production, especially as the book offers exercises that help to assess the distance separating the narrative spread from the sin of the text, for the semiotics, Refers to the theoretical developments of the science of relations, through the combination of conventional definitions and the representative and comparative limitations, to provide an approach to the application o
... Show MoreThe successive international changes in the economic, political, cultural and other fields resulted in many phenomena that occupied different levels of interest, and have been followed up, studied and analysed by specialists and researchers especially under the development of the media in the global communication.
Even though these phenomena had reflections in the communication domain like development and changes in the mechanism of behaviours between the international communities, they created in the meantime a phenomenon that caused an imbalance in the production, spread and the use of the informations that were supposed to be for fewer than 5 countries whereas it actually it is for more than 180 countries.
Objectives: In developing countries like Iraq, diarrhea was responsible for 70% of deaths among pediatrics. This study was designed to determine Iraqi mothers’ knowledge and malpractices associated with diarrhea management in pediatrics.Methods: A cross-sectional pilot study was done on a convenient sample of mothers in Baghdad – Iraq. Data collection was done using a validated questionnaire specifically designed for this study.Result: Most participants preferred to consult physicians or pharmacists about pediatrics diarrhea management. Breastfeeding was stopped by 19% of participants, whereas 35% of mothers who depend on formulated milk discontinued it. Only 30% of participants use oral rehydration solution therapy always as a
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreSchiff bases are versatile compounds synthesized from the condensation of primary amino compounds with aldehydes or ketones. The high thermal of many Schiff base and their complexes were useful attributes for their application as catalysts in reactions involving at high temperatures. This thermal behavior of Schiff bases and their complexes was evaluated by TGA/DTG and DTA curves with 10 mass losses related to dehydration and decomposition. This review summarizes the developments in the last decade for thermal analysis of Schiff bases. Therefore, synthesis of Schiff bases and their complexes are reviewe
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More