We deal with this essay about religious mystic poetry of Atika Al-
Khazraji. We think she imitates Rabia Al-Adawiyya. We do not deny that our
poetess lived in a conservative society although she lives in reality a liberal
life, so she tries to satisfy her society. In fact these mystic poems are pure
love. Poems in men.
This double standard behavior is quite clear in women’s poems in the
Arab world of this era.
Objectives: The study aims: (1) To determine effectiveness of instructional health education vascular access on hemodialysis patients' knowledge, (2) To find out the association between effects of instructional health education vascular access and demographic characteristics of (age, gender and educational level). Methodology: A quasi experimental study –control study design is carried out at AL-Hussein Teaching Hospital in AL-Nasiriyah City, from 3November,2015 to 2 June, 2016. A non-probability (Purposive sample) of (80) patients with vascular access devices on maintenance hemodialysis patients divided int
The research represents an applied study to the urban scene of Baghdad city center within the area of (Al Bab Al Sharqi – Al Tahrir Square) through studying and identifying the levels of the reciprocal correlation of advertising signs impact on urban scene , then finding out the indicators and potential values which have made advertising signs as positive value by achieving the mechanisms of visual quality or a negative value by achieving mechanisms of visual pollution. And then examining the resulted visual perception defect reforming mechanism from it and identify the basic elements represented of the laws and legislation known worldwide. When presenting the problem, The research depends on: (Lack of clear perception
... Show MoreStrives Total Productive Maintenance to increase the overall effectiveness of the equipment through the early involvement in the design and manufacture of equipment productivity. It also operates in an environment of simultaneous engineering work on the synchronization of activities to take advantage of early information by maintenance engineers, design, operation, and that helps to reduce the faults and facilitate future maintenance tasks.
Has adopted a search in the theoretical concept of the total maintenance productivity and concurrent engineering activities carried out during which the conjunction a
... Show MoreBackground: Background : Patients with non-rheumatic atrial fibrillation have high risk of thromboembolism especially ischemic stroke usually arising from left atrial appendage .Transoesophageal echocardiography provides useful information for risk stratification in these patients as it detects thrombus in the left atrial or left atrial appendage. Objective : This study was conducted at Al-Kadhimiya Teaching Hospital to assess the prevalence of left atrial chamber thrombi in patients with chronic non-rheumatic atrial fibrillation using transoesophageal echocardiography and its clinical significance as well as to verify the superiority of transoesophageal over transthoracic echocardiography in the detection of these abnormalities. Type of
... Show MoreBackground: In young adults, multiple sclerosis is a prevalent chronic inflammatory demyelinating condition. It is characterized by white matter affection, but many individuals also have significant gray matter involvement. A double-inversion recovery pulse (DIR) pattern was recently proposed to improve the visibility of multiple sclerosis lesions. Objective: To find out how well a DIR sequence, FLAIR, and T2-weighted pulse sequences can find MS lesions in the supratentorial and infratentorial regions. Methods: A total of 37 patients with established diagnoses of multiple sclerosis were included in this cross-sectional study. Brain MRI was done using double inversion recovery, T2, and FLAIR sequences. The number of lesions was count
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More