Thisstudy aims to determine the specifications of obese women accordingto the heightand type of obesity. It also aimstoidentify the significance of differences in choosing ready-made clothes for the research sample. Finally, the significance of differences in choosing ready-made clothes according to the variable of binaryclassification ofobesity is also identified.The study sample includes obese women: employees, non-employees and students with the age group (18-50) years.The weights and lengths of the sample have been taken to suit the group of obese women.Aquestionnaire in the form of an open question was distributed among (50) obese womenso as to extract the items of the questionnaire. After that, the questionnaire was distributed among (100) obese women to obtain answers. Thedata were statistically analyzed and the BMI indicated thatthere were four types of obesity for the sample studied: overweight and high obesity, very high obesity, excessive obesity, and obese to the extreme.Itwas called abinary classification. The first type included (42) obese women,whilethe second type included (58) obese women .The bodies of the sample were identified: (22%)of the sample representedshort obese women,the ratio of (68%) represented obese women of medium-length, and the proportion of (10%)represented tall obese women. It has become clear through the recognition of the significance of differences when choosing clothes in general, that they areall statistically significantexcept for the seventh item (the best clothes are those with dark-colors, because they make me look thinner). Besides,there are no individual differencesin the sample responses in favor of the answer (sometimes) at the rate of (5.180).
Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreObjectives. This study aimed at finding out whether anterior teeth angulation and inclination have a relationship with the maxillary teeth and dental arch dimensions. Methods. Fifty study models with normal occlusion were selected from the archive of the Department of Orthodontics at Baghdad Dental Faculty. Maxillary dental arch width and length at different points were determined in addition to measuring anterior teeth angulation, inclination, crown thickness, overjet, overbite, and Bolton’s ratios. The unpaired t-test and Pearson’s correlation coefficient test were used for data analysis. Results. No statistical gender differences were reported in all measurements except the dental arch widths and length where males had signif
... Show MoreA new carbonyl complexes of triazole and oxadiazole were synthesized. These complexes were identified and their structural geometric were suggested by using FT-IR and UV-Vis spectra, conductivity measurements and other chemical and physical properties. The spectra data (FT-IR, UV, Vis.) with the substantial aid of group theoretical calculations gave so many evidences for the proposed geometries and the type of bonding of these compounds
Prison and imprisonment
And their impact on the strengthening of power
In the Qur'anic perspective
In his study, the researcher highlighted the most important methods of authorship in the fundamentals of jurisprudence and speech. Fundamentalist rules and extraction and access method; they also distinct from each other that each has special divisions of the subjects of jurisprudence.