Background: The COVID-19 pandemic has an immense effect not only on the social and economic lives of people but also on the surgical lives of surgeons, residents, nursing staff, and patients as well as ground level staff. Amidst this COVID pandemic, emergency surgeries were being done but at a decreased rate, whereas elective cases depended on the will of hospitals, surgeons, and patients. Study aims to promulgate a "Neo–Surgical Check Box" by amalgamating the WHO surgical checklist and the results obtained from the questionnaires.
Subjects and Methods: After receiving ethical clearance from the Institute Ethical Committee, an online questionnaire with 50 questions divided into
... Show MoreBackground: Health education was put as one of the components of primary health care elements and was recognized as a fundamental tool to the attainment of health for all
Objective: To evaluate the Knowledge, attitude regarding health education & to find out if there is any association between the gathered data and certain variables (age, gender, educational level, occupation). Methods: A Cross-sectional study done at Al Mustansyryia Primary Health Care Center from the 1st of January to 1st of May 2016. All patients attending the Primary Health Care Centers who were above 18 years of age and willing to participate in the research (303) were included in t
... Show Moreالتعددية السياسية بين الرفلض والقبول دراسة نظرية لأبرز الاتجاهات الاسلامية المعاصرة
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreIn this research, we discussed and analyzed the relationship between oil prices and the U.S. dollar exchange rate in Iraq. The study adopted the descriptive analysis and econometrics analysis. The descriptive analysis refers to the rise (fall) in crude oil price lead to appreciate (depreciate) in the Iraqi dinar exchange rate, though the channel of the international reserves. The econometrics analysis is based on monthly data covered the period (December/2002 – December/2011), the unit root test, co-integration test, vector error correction model, and Granger causality test have been adopted in this research to check the existence and direction of this relationship. The results refer to the lon
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreMechanism of Arbitration in the Stock Exchange Disputes