لعلنان نق اأ اّاد أَ ثرالشم تَ ام يلثهاتس يل هامني ا يل ب نال س ييننانن ب د اّاد ين ا يلنال ني نا ي
تنن عل ينني مَ ينط يئني، يلقد قنقج ع طمنق ي ق ن ب ييننن ثع يلأحليث على اّأ يلحنلاي يل و هاع مأني يلقاد
نضعُ ن ش ن نّهن عنلثن نُرأ مُ يلأحلي ش ث دّ ذ ن طمنقيٍ نل ني.
حلُ يلعل م ييننننني يلقد قهقبم ل ي مناي يل ب نال س يلش هامت ققالنم يلش نانئد يلأل ي يلقاد ى قُعناى ق ننام
يل ش نال س يل و نال د لاى يين ان د شّ حناب، اد نىمققان نل ب نال س يين ان د لاى ثناق لإ يل ب نال س يي اليعد ا علام
يل مث ي يل ش عر أني يلل أ أني.
Neuro يل مث ايُ يلع أ را ني يلل ب ناي ا يلثراطلا يلعم اد يلاذت يةقمحقا قم ثاي للثُراطلا يلأ ن اد
اّاد ضا ةنعالف قعابلل يل أ را ن اّاد يلعم ناااي) 1(. ذ و N.L.P ثخقرام Linguistic Programing
يل أ ر ن ذي قعألشل دّ يلعم ني نُعطى يل أ ن أ لل أ ر ي يلأ م يلأ لى، ينقلىلد على را أ حي ثان يةقمحقا ثان ان ش
اّاد شث ه ثا – ناانطي – نَاا " مث ايُ يلأعرانب عا طمناأ يلل و اي " ) 2(. مث ايُ يلأعرانب اد مث ايُ
ع أ ر ني، لأثان تننا ش نانلقُهن يلل ب اي تننا عراأ ني لُ ناي. ذلاس خس اّن لثان هاننش ثا قم ثقا – علاى نحا رنام
.) لةنأ – لى يل مث ي يلل ب ني يلعر أني لللإ رَلب شث ي قوم هذي يلث ض ن ح ن ل ي مني قخ ب رر نُ) 3
ةال يخقل ا قناثنن اذي يلعلام قعمن نقا ثاع يخاقسس ي ينان يلون ام لنا ، نُّناثأن يلا ع " اا ي مث ش ج
قه ند يلعقد ") 4(، نُقنمبُ ذلس يلث ه م ث ه م " علم ليمف يلعق ش د " لاللإ نَقا ند م ناي، حنا )) قثانا يل مث ايُ
نلل أ نن يلعر أني طن ي م ثن ثن لتن ني ق ن عقلس، ا نُعألثاس لانق قّاط ق أ ا حنىقاس يلن ناني نُال تس، اد
يلحانى يلقعنناي نال ش س ييخامن ، نخقرانم، ا علامُ ليمف يلعقاد را مف ثُ لاى لقشحقناأ يلنقأانئج يلقاد قم ان
5(. ققخذ يل مث يُ يلعرا أني يلل أ ناي لاللإ ل. ثحأثال يلقتمنقاد قناثني خَاملإ، ذ نالع ن يلهنلناي يلن ناني يلقاد ())
2
قث ااد عناال )) طمنقاي ثن ثاي لثعمّاي قمتناب يلاشن ق يينناننني يلقعنثا د ثعهان نانئد نانلنب ثحاأللف حناث
نثتا يلقاب نمُ هاتدٍ حننامٍ ش نامنع اّاد عثلناي ييل ي مس يلقراأ م، يلأ تّانم، يلها أ ع م، نلقأانلد اّاد يلنال س،
.) يلثهن ي م يلألي يينننند يل نلت يل تمت يلن ند ر مف عنثي (() 6
نعلاد قناثنقش أنن ان نلهنلنا ي يلون ناأني ت نهان علثان نهاقأم نئاي ييننان يلليخلناي، قناخنم طنةنقا
ق نههن لى ثن نّ خنمُ خنمُ ث قثع ، تثن نهقبم علامُ يلهنلناي يل نئنا ي يل نينان علا م يلط نعاي انلقحتم نئاي
.) ييننن يلخنم ني) 7
Objectives: The study aims to assess and evaluate the caregivers knowledge about management of the children with growth hormone deficiency and to find out the relationship between caregivers kowledge and caregivers age, gender, number of individual in house hold, Date of treatment started ,Caregivers level education and economic status Methodology: Quazi expermental study design was carried out at (Child's Central Teaching Hospital, Medical City of Al Imamian Al Khadhmain Teaching Hospital, and National Centre for Treatment and Research of Diabetes,Specialized Center for Endocrine Diseases and Diabetes, and Department of Medical City Children Welfare Teaching Hospital started from
... Show MoreCancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic co
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThe fundamental problem in determining the role of television programs in broadcasting the culture of community for peace through studying almosamig kareem program by studying the topics addressed in this program. It is a descriptive study and it follows the approach survey method. In this study, the spatial framework is limited to the program of almosamih kareem on YouTube, while the temporal framework is concerned with the episodes that are raised on YouTube from the second half of 2014 to 2015 of almosamih kareem program. The fundamental problem in determining the role of television programs in broadcasting the culture of community for peace through studying almosamig kareem program by studying the topics addressed in this
... Show MoreStarting from the term (forbidden montage) initiated by the French critic (Andre Bazin) as a method of processing the movies that depend on (mise en scene) achieved by the action of the camera and its ability to photograph and employ the depth of the field, in addition to the possibility of free movement without interruption in the filming environment in order to avoid montage as much as possible (the montage that distorts focus and distracts attention and moves away from realism, which is the most important theoretical pillar of Bazin in photography). The pursuit was behind a cinema that depicts its topics in one integrated snapshot with all its details thus approximating reality without any interference of montage. Our study sta
... Show MoreInternational news websites, including Russia Today, pay special attention to the media image of Afghan women, especially after the Taliban movement took control of Afghanistan. Therefore, it was necessary to know the image of the Afghan woman, the fate of the rights she acquired in recent years, and the transformations that affected her after the Taliban took control of the government, and studied them on international news sites, specifically Russia Today.
The researcher summarized the problem of this study in the following question: What is the media image of the Afghan woman on the Russia Today news site?
... Show More
Abstract
This research attempt to explain the essential aspects of one important model in management of Bank risks , that is (stress testing) , which increase the concentrate on it resulting the negative affects of Global financial crisis that it accuar in 2008 to study the application possibilities in iraqian banks to enhancing the safety and financial soundness Becuase the classical tools in Risk management don’t give clear image on Banks ability in facing risks, hence the Basel committee on Banking supervision focusing in agreement of Basel 2,3 on stress testing when it doing the internal capital adequacy assessment process (ICAAP) .
To achieving the reseach obje
... Show MoreThis research includes the application of non-parametric methods in estimating the conditional survival function represented in a method (Turnbull) and (Generalization Turnbull's) using data for Interval censored of breast cancer and two types of treatment, Chemotherapy and radiation therapy and age is continuous variable, The algorithm of estimators was applied through using (MATLAB) and then the use average Mean Square Error (MSE) as amusement to the estimates and the results showed (generalization of Turnbull's) In estimating the conditional survival function and for both treatments ,The estimated survival of the patients does not show very large differences
... Show Moreتم استخدام خرائط ضبط الجودة الإحصائية لتقييم جودة الخدمة التعليمية في جامعة الباحة، ويهدف هذا البحث إلى استخدام خرائط ضبط الجودة الإحصائية لقياس مستوى الجودة وفجوة الجودة بين توقعات الطلبة وإدراكاتهم لمستوى الخدمة الذي تقدمه جامعة الباحة. حيث تم اختيار عينة من 200 طالب وطالبة عشوائيا باستخدام العشوائية العنقودية من 4 كليات خلال الفترة 01 – 30/2015م، وجمعت البيانات من خلال استبيان جودة الخدمة الذي يقيس ت
... Show MoreThe current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show More