Background: Historically the traditional medical program are divided into preclinical basic sciences course which taught separately (subject based) and clinical course which taught also as subject based, spoon feeding ,few delivery modes , no or few interactive session and the assessment solely based on examination and no weightage is given to the continuous assessment.Curricular reform: In the last few decades, there have been increasing pressures on medical educators for curriculum reform, and many accreditation bodies were established a guidelines for the medical schools. In many countries, the traditional approach has largely been modified towards a more integrated approach. An integrated approach is still subject centered but transcends the traditional subject boundaries. Teaching units from subject disciplines are fused together around themes/concepts such as body systems.Conclusions: For medical educators, it is of utmost important to be familiar with the current trends in program and curriculum design. Medical curricula need to be dynamic and responsive to external influences and changes if they are to ensure that the doctors of the future have the knowledge, skills and attitudes required by the communities which they serve
The aim of this research is to identify the strengths and weaknesses of organizational health in the Iraqi Central Handball Federation from the point of view of those who manage the implementation of the annual curriculum, and adopt a descriptive approach in the method of studying the case. This is based on a sample of administrators of the Iraqi Handball Federation curriculum [trainers, governors, members, president, the 138 members of the Central Federation's Administrative Authority, the President, members of the sub-federations of the sports market (2021/2022) selected deliberately by 100% and then divided into statistical analysis sample (30), reconnaissance sample (10), and application sample (98)]. The regulatory health questionnaire
... Show MoreGestational diabetes mellitus (GDM) is a growing health concern that usually appears during the second and third trimester stage of pregnancy and is characterized by carbohydrate intolerance of variable severity. The aim of the present study was to scrutinize the relationship between the G972R polymorphism of the insulin receptor substrate-1 (IRS-1) gene with GDM in the Iraqi female population. One hundred and twenty of blood samples taken from healthy women (control) and women with gestational diabetes mellitus in 3rd trimester stage of pregnancy, fasting blood glucose (FBG) and HbA1c% measured to diagnose GDM, lipid profile (cholesterol, triglyceride, HDL, LDL, and VLDL), insulin concentration, insulin resistance and beta cell function to
... Show MoreMost of the literature on the management and application terkzat waved the last period on large organizations was the negligence of knowledge management in small organizations where research aims to find out knowleddge management, small projects In oxygen Ahli plant in Iraq, and the fact the role of knowledge management in small projects from the standpoint of employees in order to achieve this used production method results. The results showed that knowledge management has a role in the high level of productivity during the years 2010-2013. The results showed that knowledge management has a role in the high level of productivity during the years 2
... Show MoreBackground: Melanin pigmentation of the gingiva appears in all ethnicities. Excessive pigmentation is an esthetic concern that has increased awareness about depigmentation procedures. This epidemiological study aims to find the correlation between skin color and gingival pigmentation in Sulaimani Governorate, Kurdistan/Iraq.
Subjects and Methods: A total of 820 apparently healthy and non-smokers, including 338 males and 482 females with healthy gingiva, aged between (18-40 years old) were enrolled in this study. Clinical examination on the participants’ gingivae was performed to assess color, and the distribution of pigmentations. Afterward the of participants skin color were
... Show MoreBackground: Iron homeostasis is crucial to many physiological functions in the human body, such as cellular activity, erythropoiesis, and the innate immune response. Iron deficiency anemia may occur from obesity's ability to disturb iron homeostasis. Obesity may be seen as a pre-inflammatory condition with mild, ongoing systemic inflammation. Additionally, an increase in hepcidin levels by chronic inflammation causes iron insufficiency in obese people. For this reason, this current experiment is designed to investigate the iron profile and some hematological and inflammatory parameters in obese adults in the Kurdistan region-Iraq.
Subjects and Methods: The cross-sectional study w
... Show MoreOne of the main environmental problems which affect extensively the areas in the world is soil salinity. Traditional data collection methods are neither enough for considering this important environmental problem nor accurate for soil studies. Remote sensing data could overcome most of these problems. Although satellite images are commonly used for these studies, however there are still needs to find the best calibration between the data and real situations in each specified area. Landsat satellite (TM & ETM+) images have been analyzed to study soil pollution (Exacerbation of salinity in the soil without the use of abandoned agricultural for a long time) at west of Baghdad city of Iraqi country for the years 1990, 2001 & 2007. All of the th
... Show MoreAbstract The success of the system of government in any country needs to have a handle on the amount of power efficiency , capacity , capability and wisdom, Iraq has gone through since its inception through several stages of time, namely: The first stage: which ran from August 23, 1921 until July 14, 1958 and was ruling monarchy (rule of the royal family) and punishing power of political elites both of them and works access to power without taking into consideration the laws and principles of the Constitution, and as a result of the inability of civilian powers and political parties access to power to grant that army officers regulatory and disciplinary specifications as well as possessing arms and overthrow the rule of the minority coup
... Show MoreThis study objective is to identify the visual pollution in Karrada district main streets as an example of main streets in Baghdad, the public opinion about each pollutants, solutions to reduce and eliminate the pollution were suggested as well. In order to accomplish this objective different methods were used, 16 pollutants were selected, pictures of each pollutants were taken and a questioner were distributed randomly for 270 people to evaluate the public opinion with statistical methods. Garbage, their disposal and storage areas took the first two places as the highest offensive pollutants. The people showed that they find long lines of vehicles, debris and generators appearance ranked third, fourth and fifth respectively .This resear
... Show MoreThe inhibitive action of Phenyl Thiourea (PTU) on the corrosion of mild steel in strong Hydrochloric acid, HCl, has been investigated by weight loss and potentiostatic polarization. The effect of PTU concentration, HCl concentration, and temperature on corrosion rate of mild steel were verified using 2 levels factorial design and surface response analysis through weight loss approach, while the electrochemical measurements were used to study the behavior of mild steel in 5-7N HCl at temperatures 30, 40 and 50 °C, in absence and presence of PTU. It was verified that all variables and their interaction were statistically significant. The adsorption of (PTU) is found to obey the Langmuir adsorption isotherm. The effect of temperature on th
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the