Abstract
Objective: The purpose of this study is to investigate the family-centered care health services of family-provider partnership in Baghdad/ Iraq.
Methods: A descriptive cross-sectional study is conducted in Baghdad Province. A cluster samples of 440 clients who review family centered care for the purpose of health services. The instruments underlying the study phenomenon deals with client's socio-demographic characteristics and family centered care questionnaire which include (partnership related to decision-making team, supporting the family as the constant in the child’s life, family-to-family and peer support and supporting transition to adulthood). The relia
... Show MoreA total of 28 birds were examined to investigate about the distribution of the nematode Hadjelia truncata among some members of the avian family Columbidae in Al-Diwaniya Province, Central Iraq. The percentages of the infection rate with this nematode were 27.27, 37.5, 14.28 and 0 in Columba livia, C. palumbis, Streptopelia decaocto, and S. turtur respectively. Reporting Hadjelia truncata from Streptopelia decaocto constitutes a new host record.
A comparative investigation of the anatomical characters through a microscopical examination of the prepared transverse sections of the stem was carried out. Six plates with 32 photomicrographs were provided to convincingly show the considerable variations of anatomical characters within the nine examined species. The matrix of 18 anatomical characters which included nine quantitative and nine qualitative was applied for the clustering analysis (CA) followed by the principal component analysis (PCA) using the Multivariate Analysis of Ecological Data, PC-ORD.
The results exhibited significant variations among the species resulting in the construction of an artificial key; this key accurately represents a sufficient tool to display the
The follower to study the markets in the Islamic Mashreq (Iraq, Persia and the country of Ma
Behind the river for the period from the reign of the Prophet Muhammad until the end of the Islamic era) to find that there
A remarkable development in the pattern, shape, planning and privatization of markets
Islamic cities and places are the main conditions for their existence, which is the mosque of the mosque
And markets, and these markets have evolved from being a space in which there are no building and no ceilings to shade them in
The places of sale and purchase to specialized markets classified according to the materials and goods produced in them
This would facilitate the task of supervising it by the market factor and
Speech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.
There is no doubt that Jane Austen is one of the most studied authors of the late 18th and early 19th centuries. Her female characters have been extensively studied and they seem to have aroused much interest as manifestations of the conduct of their time. Her heroines have realized that there were many mistakes in the rules of conduct that controlled and restricted their behaviors. Thus, they have found no fault in correcting these mistakes, by behaving naturally without acting. Elizabeth Bennet the heroine of Pride and Prejudice and Marianne Dashwood of Sense and Sensibility are the chosen examples of that kind of women.
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show Moreمقدمة
تدور الدراسة في علم الاقتصاد المنزلي حول احتیاجات الانسان الضروریة لاستمرار الحیاة ومواقف في محیط
الاسرة وتفاعل مع ظروف البیئة المحیطة بھ .والتي تكون دائمة التغییر لذلك یمكن تعریف علوم وفنون الاقتصاد
المنزلي وفنونھ انھا عبارة عن مجموعة منظمة من المعارف والعلوم تتركز في محور الاسرة والمنزل حیث ینمو
ویتطور الانسان بالعلاقات الانسانیة والنواحي الاقتصادیة والاجتماعیة من جھة والنواحي العلمیة وا
Tow results are proved. The first gives necessary and ullicient
conditions for a permutation group to have the prope1ty that each of its rational - valued character can be written as (integral) linear combination of characters induced from the principal characters of certain subgroup. The mher presents that this property is extendable to direct product of groups.
Examples give.