A ventricular septal defect (VSD) is defined as a communication between the left and right ventricles or between the left ventricle and the right atrium. VSDs are amongst the most common abnormalities of the heart. They can be present in isolation or in association with other congenital cardiac abnormalities. This is study done with the aim to evaluate the types, size, associated CHD with ventricular septal defect in children and adolescent in two cardiac centers (Medical City Complex cardiac clinics, Ibn Al Nafaes teaching hospital) in Baghdad - Iraq
The good preparation for a class of young people is the great importance requirement.
This case on the state role to put exceptional philosophy bench form which the entire category
through group of experienced educators to prepare different and distinct programs to suit
every specialty of this class. This base of this role can draw upon, including state institutions
need of young people add urges the mental and physical abilities, scientific and cognitive
specialties and carry it from the levee in the academic certification .And we must not lose the
lose sight of the link that pilot projects in which to invest the energies of youth programs and
curricula attractions including incentives .It's become the subject of jo
The research included (the aesthetics of the sculptural formulations of swords in the Al-Kafeel Museum) four chapters. Al-Kafeel Museum.)
Within the time period: (1240 AH / (1824 and 1825) AD - 1312 AH / (1894 and 1895) AD). The second: the types of Islamic swords. The third chapter included (research procedures), and the analysis of samples from the sample (3) as a model according to the descriptive approach, and the fourth chapter dealt with (results, conclusions, recommendations, and proposals). As well as recommendations, proposals and sources.
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreIn the midst of the public narrative film , we discussed the issue of dealing with the current narrative more specialized which its future dimension form shift and twist on the level of construction narrative film in some of its diverse and renewable trends in its two ways theoretical and practical and non-give important implications for the modes of operation of the renewable narrative structures and the fact that the cinema is an arts which always open to ideas in neighboring fields and this come naturally as a result of the continuing intellectual and knowledge sharing between cinema and other science . our current research has already begun to address the issue in a stream of consciousness narrative structure film based on all that t
... Show MoreThe aim of the research is to demonstrate of the relation and the influence of the components of economic intelligence (strategic alertness, information security policy, impact policy) in achieving of economic growth (creativity, competitiveness, quality improvement). The questionnaire was used as a main tool for selected sample. Answers analyzed by using the statistical program (SPSS) to calculate the arithmetic mean, standard deviation, weight percentage, correlation, F test, and Squared factor (R2).
The research derived its importance from the distinguished role of information systems in the work of industrial companies, and its impact toward achieving economic growth rates in its various activities. T
... Show More