Futsal and blind football are group games of a competitive nature due to their excitement, excitement, fun, and aesthetic goals with charming artistic touches. This explains the public's passion for these two games, whether healthy people or blind people play them, to expand their vision and knowledge. About these two games, a historical approach is presented about their origins, development, and how they became globally recognized competitive sports with unified rules and world championships at various levels. Studying the origin and global spread of both futsal and blind football and identifying the most prominent developments in the rules and tools for futsal and blind football. The most important findings were that both futsal and football for the blind had professional foundations and arose as a result of societal needs and circumstances. It is necessary to conduct historical studies of different sports to provide a comprehensive understanding and knowledge of how sports developed.
Each organization struggles to exploit each possible opportunity for gaining success and continuing with its work carrier. In this field, organization success can be concluded by fulfilling end user requirements combined with optimizing available resources usage within a specified time and acceptable quality level to gain maximum profit. The project ranking process is governed by the multi-criteria environment, which is more difficult for the governmental organization because other organizations' main target is maximizing profit constrained with available resources. The governmental organization should consider human, social, economic and many more factors. This paper focused on building a multi-criteria optimizing proje
... Show MoreThe fuzzy assignment models (FAMs) have been explored by various literature to access classical values, which are more precise in our real-life accomplishment. The novelty of this paper contributed positively to a unique application of pentagonal fuzzy numbers for the evaluation of FAMs. The new method namely Pascal's triangle graded mean (PT-GM) has presented a new algorithm in accessing the critical path to solve the assignment problems (AP) based on the fuzzy objective function of minimising total cost. The results obtained have been compared to the existing methods such as, the centroid formula (CF) and centroid formula integration (CFI). It has been demonstrated that operational efficiency of this conducted method is exquisitely develo
... Show MoreThe Islamic orthodox caliphs had a great importance in the history of Arabs in
particular, and of Muslims in general.
Some attributed poetry to them. This issue to see whether such an attribution is correct
or not.
This research tried to deal objectively with this poetry .it discussed the topic,
exploring the scholars’ opinions about poetry attributed to the Islamic orthodox
Caliphs, stating their dispute : some of them agreed while others rejected the
attribution.
The research adopted the opinon that had rejected for reasons stated in the
research, of them: the weakness of poetry and its dealing with unimportant things, for
example, the caliph Omar composed verses about a new garment worn by him.
Is it
Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.
Objectives: To assess the qualifications and performance of newly graduated pharmacists and explore factors that affect their performance in public hospitals. Methods: This qualitative study included face-to-face, semi-structured interviews with hospital practitioner pharmacists. It was conducted between March and May 2023 in Kerbala province, Iraq. The participating pharmacists were selected purposefully because they had three or more years of work experience at governmental hospitals. The audio-recording interviews were transcribed. Thematic analyses were used to generate themes and subthemes from the interviews. Results: Twenty-seven hospital pharmacists participated in this study. The study found that there are several factors t
... Show MoreTrajectory tracking and vibration suppression are essential objectives in a flexible joint manipulator control. The flexible joint manipulator is an under-actuated system, in which the number of control actions is less than the degree of freedom to be controlled. It is very challenging to control the underactuated nonlinear system with two degree of freedom. This paper presents a hierarchical sliding mode control (HSMC) for a rotary flexible joint manipulator (RFJM). Firstly, the rotary flexible joint manipulator is modeled by two subsystems. Secondly, the sliding surfaces for both subsystems are constructed. Finally, the control action is designed based on the Lyapunov function. Computer simulation results demonstrate the effectiveness of
... Show MoreBackground: Osteoporosis is a skeletal defect manifested by a reduction of bone strength as a result of reduced bone mass to the extent that there is a higher risk of fracture even on minor trauma. Hysterectomy in a premenopausal woman is a well known cause of ovarian failure resulting in an increased risk of osteoporosis.
Objective : To clarify bisphosphonate's preventive effect on osteopenia and osteoporosis in premenopausal women after hysterectomy.
Type of the study: Cross –sectional study.
Method: 84 premenopausal females post hysterectomy aged between 40 – 50 years, were enrolled in this randomized controlled double blinded trail a
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More