Is no longer a football player looks to sport as a means of entertainment and physical development. But become see as part of The economic and is getting in return for the effort of، Through a contract with a club to organize the activity which is called a contract of professional, This contract is similar to the rest of the contracts in terms of problems and dispute that arise during the implementation or after it ends because of the nature of sports to such disputes and privacy being subject to special rules (regulations, national and international professional) required that subject to judicial bodies private mission confined settle sports disputes these entities and is affiliated unions legal committees and the court of arbitration for sport international sports court, with this judicial authorities it on the conflicting parties in the contract professionalism must have direct recourse in the event of any dispute between them.
The study conducted to investigate the association between Helicobacter pylori infection and eye diseases (Glaucoma, Cataract, CSR and Uveitis). One hundred and four patients with multiple eye disorders (10-80) years were observed from 10/9/2020 to 18/11/2020 and compared to thirty-one healthy people (19 female and 12 male). Each participant was tested for H. pylori CagAAbs and TNF-α using an enzyme-linked immunosorbent assay (ELISA). The results have shown that there was a non-significant difference (p≥0.05) in the concentration of CagAantibodies in sera of patients with eye diseases except in the case of CSR (central serous chorioretinopathy), which was a significant difference (P≤0.05) compared to the control group. Also, the result
... Show MoreThe internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe hydraulic behavior of the flow can be changed by using large-scale geometric roughness elements in open channels. This change can help in controlling erosions and sedimentations along the mainstream of the channel. Roughness elements can be large stone or concrete blocks placed at the channel's bed to impose more resistance in the bed. The geometry of the roughness elements, numbers used, and configuration are parameters that can affect the flow's hydraulic characteristics. In this paper, velocity distribution along the flume was theoretically investigated using a series of tests of T-shape roughness elements, fixed height, arranged in three different configurations, differ in the number of lines of roughness element
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More
