Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the pos
... Show MoreBackground: The aryl hydrocarbon receptor (AhR) is a ligand-activated transcription factor historically recognized for its role in the regulation of toxicity mediated by environmental chemicals. Recent research points to AhR's critical participation in male reproductive physiology, particularly in spermatogenesis, hormone signaling, and the maintenance of sperm quality. Both endogenous ligands (e.g., dietary and gut microbiota-derived metabolites) and exogenous pollutants (e.g., dioxins and benzo-α-pyrene) influence AhR-mediated pathways, making it a key link between environmental exposures and male fertility. Results: This review highlights AhR's influence on the male reproductive system, emphasizing the role of endogenous AhR ligands an
... Show MoreThe current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreThe process of transformation from the central economy to a free economy requires restructuring the economy according to a new economic philosophy that relies on activating the role of private economic activity in which private and medium-sized institutions occupy an essential axis for their active role in the economies of all countries, especially those countries that have directed towards the market mechanism and sector leadership. The special process of economic development and the role that commercial banks can play in advancing the financing of these projects by establishing specialized business incubators for financing.
What encouraged countries to pay attention to these institutions is the ease of
... Show MoreThe contribution rate of tax revenues in the federal budget is very small compared to the rate of contribution of oil revenues and this leads to negative repercussions on the Iraqi economy and the budget becomes a prisoner of high and low oil prices, and this is a problem that needs to be studied to know the extent of the impact of economic and political decisions on the size of tax revenue and The research goal is determined in studying the effect of amending the Unified Law No (26) of 2019 on the size of annual tax revenues . &
... Show MoreThe study aimed to explaining the concepts of water footprint and virtual water and how these two concepts could use to achieve water savings at the local level to meet the water supply deficit in Iraq, which is expected to increase in the coming years and influence of that on food security in Iraq by using these concepts when drawing production, irrigated and import plans in Iraq. The study aimed to studying the water footprint and virtual water and their impact on the foreign trade for wheat and rice crops during the period 2000-2022 and estimating the most important indicators of virtual water and the water footprint of the study crops due to the importance of these criteria in det
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable