Background: Menstrual problems with all manifestations ranging from life-threatening bleeding to amen- orrhea are considered patterns of abnormal uterine bleeding (AUB), which is until now a popular reason for referral to the gynaecologic clinic and requires a special diagnostic tool. Objective: To assess the accuracy of hysteroscopy in diagnosing endometrial pathologies and to compare it with sonographic and histopathologic reports. Patients and Methods: A prospective study conducted in the Baghdad Teaching Hospital on 60 Iraqi females having varying complaints from abnormal uterine bleeding in pre- and post-menopausal women, infertility, and chronic pelvic pain with normal or abnormal ultrasound findings. Office hysteroscopy was done and
... Show MoreNear surface mounted (NSM) carbon fibers reinforced polymer (CFRP) reinforcement is one of the techniques for reinforcing masonry structures and is considered to provide significant advantages. This paper is composed of two parts. The first part presents the experimental study of brick masonry walls reinforced with NSM CFRP strips under combined shear-compression loads. Masonry walls have been tested under vertical compression, with different bed joint orientations 90° and 45° relative to the loading direction. Different reinforcement orientations were used including vertical, horizontal, and a combination of both sides of the wall. The second part of this paper comprises a numerical analysis of unreinforced brick masonry (URM) wa
... Show MoreThe topic area of that’s research dealing with values which adopted by Iraqi people since 1980, many changes and variables which make many situations and skills which the life is suitable in war and conflicts times. That’s values like traditional and ordering, traditionalism mean the conservation about values s and tradition which society adopted its. The Iraqi society suffering from many changes since 1980-2003, the consequently of that’s changes make Iraqi citizen more interested about luxury needs like clothes, while decreasing the interested about liberty of thought, beauty, show evidence of identity, and openness of mind. The processing of values changes associated with political behavior of Iraqi people which lead to weaken o
... Show MoreThe learner has face difficult in learning if not accompanied by strong motivation and directed towards the goals that set for himself,as the type of goals set by the learner for himself is behind the difference in achievement of the tasks and levels of learning, and these goals are directed and determine his behavior Academic in the way of his study and his direction towards the lecture and colleagues.
Current research aims:
- Build tools for thegoal orientations
- Measuring the goal orientations for the university studentsaccording to variables (type/class/specialization).
In order to achieve the objectives of the research, a tool was constructed for the (the Goal orientation), and the psych
... Show MoreThis research attend about Alienation form for ornament’s clouds in Quran, which includes four parts, the first part talks about the research problem, the researcher identified by following question :( what’s the Alienation form for ornament’s clouds in Quran?). And then the research importance. The research goal talks about Alienation form for ornament’s clouds in Quran. And also research borders, likes means objectives borders, places borders, As well as Terms Definitions, in second part talks about Theoretical framework and previous studies, includes two parts, the first one study Alienation form, meaning and understandable, the second one talks about Alienation form in Islamic arts, As well as the researcher find only one stu
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show More