The aim of this study is to design a proposed model for a document to insure the mistakes of the medical profession in estimating the compensation for medical errors. The medical profession is an honest profession aimed primarily at serving human and human beings. In this case, the doctor may be subject to error and error , And the research has adopted the descriptive approach and the research reached several conclusions, the most prominent of which is no one to bear the responsibility of medical error, although the responsibility shared and the doctor contributes to them, doctors do not deal with patients according to their educational level and cultural and there are some doctors do not inform patients The absence of a document to insure the medical error and educate the medical side of the importance of the document, providing medical errors provides a stable environment for the doctor.
Theoretical and experimental investigations have been carried out on developing laminar
combined free and forced convection heat transfer in a vertical concentric annulus with uniformly
heated outer cylinder (constant heat flux) and adiabatic inner cylinder for both aiding and opposing
flows. The theoretical investigation involved a mathematical modeling and numerical solution for
two dimensional, symmetric, simultaneously developing laminar air flows was achieved. The
governing equations of motion (continuity, momentum and energy) are solved by using implicit
finite difference method and the Gauss elimination technique. The theoretical work covers heat flux
range from (200 to 1500) W/m2, Re range from 400 to 2000 an
The current research aimed to identify psychological stability and its relationship to university integration and spiritual intelligence among university students. The research sample consisted of (158) students from the College of Education - Al-Mustansiriya University.
A scale was applied: psychological stability, university integration, and spiritual intelligence, and by using the (Pearson) correlation coefficient, and the t-test, the results showed: the sample members enjoy psychological stability, university integration, and spiritual intelligence, and there is a positive, statistically significant correlation between the research variables, and the results resulted in some recommendations and proposals.
How I was eager to research the ruling on three of the most dangerous types to Islam and Muslims (the heretic, the sorcerer, the innovator, and related terms).
Because it is the most dangerous deadly disease that destroys the hearts of Muslims, and may even expel a Muslim from the circle of Islam, and how many Muslims have done or committed such a thing without knowing it. Indeed, how many Muslims have left Islam and whose wife has abandoned him without realizing it, and among them are those who have committed it without knowing it. As well as related words associated with heresy.( )
Because people debated such matters between extremists and lenient ones, most of whom were extremists, and they did not reach a conclusion. So I decid
Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th
... Show MoreThe research aims to highlight the significance and composition and the diversity of meanings and the Quranic context in the necessary and transgressive verbs in Surat (Abs).
This research consists of : a preamble , and two studies . The researcher addressed in the preliminary the importance of the phenomenon of necessity and infringement, the signs of the necessary action , the structure and controls of the act , the methods of infringement , its sections and signs.
As for the first topic : The researcher addressed the necessary verbs in Surat Abs , an applied study in terms of grammati
... Show MoreEnglish teachers in Iraq and other countries around the world up to this time use traditional methods to help students memorize new vocabularies. The sense of words or structure is not to be given in either the native tongue or the target language by definition, but is induced by the way the form is used in the situation. Situational Language Teaching (SLT) has recently become the needed method for improving speaking skills. It indicates the application of learning the language in actual and social exchange expressions so as to let learners do as required in classroom and non-classroom circumstances. This pilot study seeks to answer the following questions: Can SLT improve English speaking skills of target learners? How SLT contribute to th
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreGas Lasers are important tools that are used in variety purposes, for their low and (cw) output power. The aim of this study was to prepare a way to calculate an optimum stimulated emission cross-section in a gas laser containing a mixture of Xenon and Neon by (30%-70%). The process was a theoretical study of each gas in separate in terms of their physical properties as an active medium. The results of these calculations are logic and more convenient than other mixtures used before