Christian rites and rituals to be performed, not abandon them, and they see it as a sacred duty in Christ's (as) followers, including: (secret baptisms among Christian denominations, descriptive study) baptisms in the Christian Mystery of God of the mysteries of the Church, every Christian must be baptized always resented It was alaimanh, the Guide mentioned in the Bible by Jesus to his disciples ((just go make disciples of all Nations and immersed them in the name of the father and of the son and of the Holy Spirit, teaching them to observe all that I advised you, and here I am with you all days to the end of the age))( And be baptized in the name of the father and the son and the Holy Spirit, and that's what makes this practice through the obligatory Christian enters the Church's human, with death and burial and resurrection of Christ according to their belief, baptism is immersion and spraying with water, and the water symbolizes the death of sin, and out of the water symbolizes life.Holy cleansed, and everyone received the sacrament of baptism a Christian remains until death, in light of what they see.
BACKGROUND: Volar Barton’s fracture is a shearing mechanism of injury that results in fracture and subluxation of distal end radius in which volar rim of the distal radius is displaced with hand and carpus. Open reduction and volar plate fixation ensure more stable change of displacement, preservation of reduction, and early mobilization. AIM: This study aims to assess the functional and radiological outcome results of volar Barton’s fracture treated by volar buttress plate using the demerit points system of Gartland and Werley. PATIENTS AND METHODS: This study is a prospective descriptive observational study on 32 patients who were treated with ORIF by volar buttress plate for isolated volar Barton’s fractures between Fe
... Show MoreThis descriptive research aims atidentifying the difficulties encountered by nursing students in the development of nursing diagnostic skills. The data collection was carried out using a direct questionnaire with 62 students in My Youssef’s hospital in Casablanca. The results of the study list a set of failures related to the training of nurses. This training focuses mainly on the acquisition of knowledge; it is not aimed to the development of the real skill.
The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre
... Show MoreIn any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreRecently, much secured data has been sent across the internet and networks. Steganography is very important because it conceals secure data in images, texts, audios, protocols, videos, or other mediums. Video steganography is the method of concealing data in frames of video format. A video is a collection of frames or images used for hidden script messages. This paper proposes a technique to encrypt secret messages using DNA and a 3D chaotic map in video frames using the raster method. This technique uses three steps: Firstly, converting video frames into raster to extract features from each frame. Secondly, encryption of secret messages using encoded forms of DNA bases, inverse/inverse complements of DNA, a
... Show MoreBackground: Ionizing radiations are hazardous agents in the workplace, since all forms of ionizing radiation produce some type of injury that is incurable. Therefore, protection against ionizing radiation exposure can play an important role in the health of workers.
Objectives: is to evaluate the application of radiation protection among radiation workers at X-ray department in Erbil hospitals.
Patients and methods: Six hospitals (General and Private) were visited. Samples of 110 were randomly selected among 135 radiation workers, 47 (42.3%) female and 63 (57.3%) male Data was collected through structured questionnaires. The surveyed data was coded and analyzed by using MS Excel software, and SPSS 18 f
عُني العرب منذ القدم بإستعمال الجواهروالأحجار الكريمة ، وإزدادت هذه العناية على مر العصور ، فقد إستعملوا الحلي المتنوعة ، والملابس المطعمة بالجواهر والأحجار الكريمة .
Hardly a day passes without hearing the news of a person’s suicide here or there, as if life no longer has value for a person, and this fact is what prompted the World Health Organization to sound the alarm, after it found that suicide had become widespread in the world and published its report Under the title (Suicide Prevention - A Global Necessity), and announced the need to take care of mental Health as part of public health, because what psychological human crises are exposed to may lead to suicide.
A quick look at the position of the various legislations on suicide, we find there is a great difference, some legislations recognize the human right to death, while other legislation punishes the
... Show MoreBackground: Bullying victimization is a major public health problem. Interest in bullying in Arab world is a recent phenomenon. Publication on victimization in Iraq is scares. Therefore this study was conducted to report bullying among students of Iraqi schools.
Methods: A total of 302 students from Baghdad was selected by a cluster random sample to include in this study. An Arabic version of standardized questionnaire was obtained from the International (ISPCAN). Identification of bullying (bullies, victims and sexual victims) was done by using a cutoff for the scoring of bullying manifestation in the questionnaire depending on three repeated action at least to consider as bullies. P value less than 0.05 was considered significant fo