The aim of this study is to design a proposed model for a document to insure the mistakes of the medical profession in estimating the compensation for medical errors. The medical profession is an honest profession aimed primarily at serving human and human beings. In this case, the doctor may be subject to error and error , And the research has adopted the descriptive approach and the research reached several conclusions, the most prominent of which is no one to bear the responsibility of medical error, although the responsibility shared and the doctor contributes to them, doctors do not deal with patients according to their educational level and cultural and there are some doctors do not inform patients The absence of a document to insure the medical error and educate the medical side of the importance of the document, providing medical errors provides a stable environment for the doctor.
Shooting skill in basketball is one of the most important offensive skills and the final stage of the team's attack and the culmination of all skills in which points are scored, including the skill of peaceful shooting. The research aims to prepare competitive exercises and understand the impact of competitive exercises on developing coordination and balance for basketball players under 18 years old. The researcher used the experimental method with the single experimental group approach, including the research community of female athletes in the public directorates of education in Baghdad, totaling (6) directorates and (72) players. The research sample was selected intentionally, consisting of female athletes in the sports activity of the D
... Show MoreBecloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay
... Show More
ملخص البحث:
ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.
اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثل
... Show MoreThe research aims to highlight the significance and composition and the diversity of meanings and the Quranic context in the necessary and transgressive verbs in Surat (Abs).
This research consists of : a preamble , and two studies . The researcher addressed in the preliminary the importance of the phenomenon of necessity and infringement, the signs of the necessary action , the structure and controls of the act , the methods of infringement , its sections and signs.
As for the first topic : The researcher addressed the necessary verbs in Surat Abs , an applied study in terms of grammati
... Show MoreIn this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water
... Show MoreBack ground: Fibromyalgia syndrome (FMS) is a common chronic musculo-skeletal disorder resulting in chronic widespread pain impacting on quality life.
Objectives: To assess the relationship between FMS and knee osteoarthritis (KOA) and to evaluate the predictors of this relationship if present.
Patients and Methods: One hundred Iraqi KOA patients and 100 healthy controls were included in this cross-sectional study. Full history was taken and complete clinical examination was done for all patients. Baseline characteristics [age, sex, duration, body mass index (BMI), waist circumference, family history (Hx) of KOA, smoking history, and drug history.] were also documented. Laboratory analysis included complete blood count, erythrocyte
Gas Lasers are important tools that are used in variety purposes, for their low and (cw) output power. The aim of this study was to prepare a way to calculate an optimum stimulated emission cross-section in a gas laser containing a mixture of Xenon and Neon by (30%-70%). The process was a theoretical study of each gas in separate in terms of their physical properties as an active medium. The results of these calculations are logic and more convenient than other mixtures used before
Jordan curve theorem is one of the classical theorems of mathematics, it states the following : If is a graph of a simple closed curve in the complex plane the complement of is the union of two regions, being the common boundary of the two regions. One of the region is bounded and the other is unbounded. We introduced in this paper one of Jordan's theorem generalizations. A new type of space is discussed with some properties and new examples. This new space called Contractible -space.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More