The research talks about the most important challenges facing Muslim youth of their ideological, social and economic types, and the youth is facing several problems, the most important of which are the intellectual and social invasion to which the Islamic nation has been exposed and ways to address them from a Quranic perspective and find solutions to these problems and these challenges in accordance with Islamic Sharia and the texts of the Holy Quran. From three topics and several demands, during which the researcher tried to find solutions to each challenge through the verses of the Noble Qur’an.
Introduction. Tangential gunshot wounds (TGSW) to the head is the high-velocity bullet that does not penetrate the cranium but passes through the tissue adjoining the cranial cavity, creating a “gutter” wound and indirectly causing cerebral injury. This article presents a reporting case of TGSW to the head, discusses the mechanism underlying this traumatic injury and the possible complications resulting from it, and reviews of literature. Case description. A thirteen-year-old schoolboy was admitted to the emergency department (ER) of the neurosurgery teaching hospital in Baghdad, Iraq, with a tangential gunshot to the head of an unknown source during civilian protests in Baghdad. In addition to a seizure attack in the ER, his
... Show Moreملخص البحث
يعد البيت المكان الاجتماعي الأول الذي تبنى فيه الصحة النفسية لدى الفرد منذ بداية حياته كطفل في ظل أسرته ، إلا أن الروضة تمتلك على الرغم من ذلك أثراً تكوينياً مهماٌ في حياة الطفل وعلى شخصيته ، والتي لا يمكن ان يقلُّ عن أثر الايجابي للبيت ؛ ذلك أن المفهوم الجديد لدور الروضة لا يقتصر بمجرد كونها مكانًا تقوم فيها المعلمة بتزويد الاطفال بالمعر
... Show MoreBackground: Recent implant surgical approach aims to cause less trauma, invasiveness and pain as much as possible and to reduce patient and surgeon discomfort, time of surgery and time needed for functional implant loading. Flapless surgical techniques considered recently as one of the most popular techniques that may achieve these aims especially enhancing osseointegration and subsequently implant stability within less time than the traditional flapped surgical technique. So this study aimed to make a comparison between flapped and flapless surgical techniques in resulted implant stability according to resonance frequency analysis RFA and in duration of surgical operation. Materials and methods: A total of 26 patients with 41 implants (o
... Show MoreBreast cancer is the most common cancer among women over the world. To reducing reoccurrence and mortality rates, adjuvant hormonal therapy (AHT) is used for a long period. The major barrier to the effectiveness of the treatment is adherence. Adherence to medicines among patients is challenging. Patient beliefs in medications can be positively or negatively correlated to adherence. Objectives: To investigate the extent of adherence and factors affecting adherence, as well as to investigate the association between beliefs and adherence in women with breast cancer taking AHT. Method: A cross-sectional study included 124 Iraqi women with breast cancer recruited from Middle Euphrates
... Show MoreAbstracts:
The Central Bank is the backbone of the banking system as a whole, and in order to maintain the banking system, one of the most important functions that the Central Bank performs is the function of supervising and controlling banks, with several tools and methods, and one of the most important of these tools is its creation of the function of a compliance observer, which obligated commercial banks to appoint a person in A bank that performs this function according to certain conditions and granting it some powers that would build a sound and compliant banking system. The function of the compliance observer is to follow up on the bank’s compliance with the instructions and decisions issued by
... Show MoreTime series analysis is the statistical approach used to analyze a series of data. Time series is the most popular statistical method for forecasting, which is widely used in several statistical and economic applications. The wavelet transform is a powerful mathematical technique that converts an analyzed signal into a time-frequency representation. The wavelet transform method provides signal information in both the time domain and frequency domain. The aims of this study are to propose a wavelet function by derivation of a quotient from two different Fibonacci coefficient polynomials, as well as a comparison between ARIMA and wavelet-ARIMA. The time series data for daily wind speed is used for this study. From the obtained results, the
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More