The husband’s discipline of his wife is a right prescribed by the Sharia, but it is conditioned discipline with conditions that make this discipline intended to preserve the family institution from disintegration and scattering, so the Islamic Sharia entrusted the husband, the guardian of the family, with the task of disciplining the disobedient and disobedient wife and deviating from the family’s values and constants of mutual respect and obedience in what is good. And a sense of responsibility. This discipline goes through three sequential stages, starting with exhortation and dialogue, passing through abandonment in the beds, and ending with beating. As for the sermon, it is a quiet dialogue followed by a threat of abandonment. As for desertion, it is desertion, either verbally or desertion from sexual intercourse, and desertion is only in the marital bed. As for the beating, it is a light, harmless beating, and it may be described as a moral and psychological beating. It is intended exclusively for reform, so it is not permissible to resort to any means of discipline unless it is intended to return the wife to the institution of the family and to live together in a decent life based on affection and respect. The Iraqi legislator adopted the opinion of Islamic jurisprudence in the Iraqi Penal Code and made discipline a right of the husband in Article 41 thereof. As for the legislator in the Kurdistan region, the wife was excluded from the discipline clause. It seems that what the legislator followed in the Iraqi Penal Code is more likely.
Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show MoreBackground: The protective roles of vitamin C and total proteins in gingival inflammation were reported by several studies. The aim of this study was to measure the concentration of salivary vitamin C, total protein and their relation to gingival health among dental students. Materials and methods: The sample consisted of 67 dental students (33 males and 34 females) from College of Dentistry, University of Baghdad. Sillness and Löe (1964) was used for recording of dental plaque, while the gingival index (GI) was measured according to Löe and Sillness criteria (1963). Stimulated salivary samples were collected and chemically analyzed in Poisoning Center/Surgical Specialty Hospital by using colorimetric method to measure the salivary v
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreAbstract A description study was carried through out the present study aimed to assess health education provided by nurses to patient with gall stone "obstructive jaundice". The study was conducted at 4 teaching hospital, Baghdad teaching hospital, Al-Karama teaching hospital, Al-Yarmook teaching hospital, Al-Kendy teaching hospital where choloecystectomy was performed, in the period from first of June 2004 to end of July 2004. Data were collected through the use of questionnaire an interview from which was developed for the purpose of the present study. A non-probability (purposive) sample which was consist
Objectives: The study aims to assess some of the contributing factors to abdominal postoperative wound infection and
to find out the relationship between postoperative wound infections and some socio-demographic characteristics such as
age, gender, level of education, occupation and residential area.
Methodology: A descriptive study was carried out in Sulaimani Teaching Hospital (Kurdistan Region). The study has
started from January 15th up to October 31th, 2009. To achieve the study objectives, a purposive "non probability"
sample of (100) patients who have abdominal postoperative wound infection, Adult female and male patients who were
admitted to Sulaimani Teaching Hospital was selected.
The data were collected th
The immune infertility caused by anti-sperm antibodies (ASAs) represented about 10–20% of infertility among the couples. The ASAs interfere with sperm parameters such as sperm motility and sperm ability to penetrate cervical mucus, sperm-oocyte binding, and fertilization and embryo development. Objectives: The present study designed to assess semen analysis, presence of ASAs and DNA fragmentation index as well as correlation within these parameters in normzoospermic Iraqi subjects Patients, Materials, and Methods: A total number of Iraqi subjects (116) with range of age (20-51) years and their mean duration of infertility (4.70 ± 2.77). Seminal fluid for macroscopic and microscopic assessments done according to WHO 2010 criteria. The
... Show MoreThe aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show More