الخلفية: إن سمية الدواء والآثار الجانبية للعلاج الكيميائي تؤثر سلبا على مرضى سرطان الثدي. الأهداف: لتقييم فعالية التدخلات الصيدلانية في تحسين معرفة مرضى سرطان الثدي ومواقفهم وممارساتهم فيما يتعلق بالعلاج الكيميائي لسرطان الثدي.
The research aims to highlight on the behavioural approach in accounting, and clarify the behavioural implications of the main activities of accounting, and clarify the concept of information inductance within the framework of the behavioural approach and its impact on preparing financial statements. And that the impact of financial information on the behaviour of investment decision-makers, and to achieve the goals of the research, the researcher prepared a questionnaire according to Likert five-step scale, and he took into consideration in preparing it in line with the characteristics of the study community, and that the target community for this questionnaire is the investors in the Iraq Stock Exchange. The researcher reached
... Show MoreToxoplasma gondii is an opportunistic parasite in immune-compromised persons. The prevalence of toxoplasmosis in psoriasis patients is investigated. In addition, the treatment effect on psoriasis patients infected with toxoplasmosis through evaluating Tumor Necrosis Factor-α (TNF-α) cytokine levels is studied. Blood samples were collected from 130 individuals who involved 60 control samples and 70 samples with psoriasis. They attended Medical City Hospital in Baghdad province from October 2017 - February 2018. Then, the anti- T. gondii antibodies (IgM and IgG) and TNF- α in the sera were determined via the enzyme linked immune-sorbent assay. The highe
... Show MoreIn this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate
... Show MoreThis paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs