Preferred Language
Articles
/
HBdrXI8BVTCNdQwCyW7m
Genetic polymorphism of IL-17A (rs2275913) in Iraqi women with recurrent abortion and its relationship with susceptibility to toxoplasmosis
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Apr 01 2021
Journal Name
Annals Of The Romanian Society For
Relation Study between Chromogranin a and Other Clinical Biomarker in Iraqi Children with Growth Hormone Deficiency Undergo Treated Via Recombinant Growth Hormone
...Show More Authors

Growth hormone deficiency is a condition that occurs when a limited volume of growth hormone is released by the pituitary gland since growth hormone deficiency causes growth delays, short stature, and overall physical development delays. symptoms differ based on the age at which they occur .Aim of this study Estimating the level of growth hormone serotonin ,IGF-1 and Chromogranin A before and after with treatment recombinant growth hormone and It is the first study in Iraq that sheds light on the relationship between Chromogranin and other variables ( somatostatin, IGF-1,GH) ,also the prediction of Chromogranin A as a newly biochemical marker in children with growth hormone deficiency. In this study, 30 samples were collected from children

... Show More
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Developing Workers’ Performance and Its Role in Settling Financial Claim: An applied research in the General Iraqi Insurance Company
...Show More Authors

This research seeks to identify the dimensions of the development of staff performance (training ', incentives, management skills) and its impact on the settlement of compensatory claims adopted in the current research in the Iraqi insurance company،This research aims to highlight the role of developing insurance company’s workers’ performance in settling insurance compensation, and to check this process, the research was applied in the general Iraqi insurance company as it considered as the research community, and a sample was taken from this community that represented by company’s insurance department workers or by collecting actual data that is related to the research’s sample, in addition to the financial compensation data.<

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Prospects for adopting Takaful Insurance and its role in developing insurance services: Applied research in the Iraqi insurance sector
...Show More Authors

The present research aims to present a theoretical framework for the application of takaful insurance in Iraq, as well as to identify the level of impact on the development of insurance services in the Iraqi market, and to make recommendations and suggestions that lead to increased interest in this area, and thus contribute to the development and integration of insurance service in the Iraqi market,

The research adopted the descriptive analytical method, and the questionnaire was used to survey the opinions of the research sample consisting of department managers and their assistants and some employees of the graduate degrees in addition to employees of the departments of electronic calculator in the Iraqi insurance sector, and t

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Philosophical Framework To Intellectual Capital Readiness in Iraqi Organizations
...Show More Authors

           This research aim to present theoretical and philosophical framework regards topic of intellectual capital readiness in Iraqi universities. That is, by using strategic map in balanced score card of Norton and Kaplan (2004). This research discusses theoretical content for three main aspects reflect in its nature elements of intellectual capital readiness in organizations. This includes human capital readiness, information capital readiness and organizational capital readiness. To clear each element, the authors relay on mechanism to determine gape per element of intellectual capital elements.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 26 2022
Journal Name
Iraqi Journal Of Science
A Mathematical Model for Iraqi Airways Company about Evaluating Its Objectives and Strategies
...Show More Authors

In this paper, we introduced a mathematical model for Iraqi Airways Company about evaluating its objectives and strategies. First, we studied Iraqi Airways schedules with different departure cities for each airline path. Then, we applied some fuzzy integrals for determining the best airline path.

View Publication Preview PDF
Publication Date
Wed Feb 01 2012
Journal Name
Ibn Al-haytham Journal For Pure And Applied Science
Using Restricted Least Squares Method to Estimate and Analyze the Cobb-Douglas Production Function with Applicatio
...Show More Authors

Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using Restricted Least Squares Method to Estimate and Analyze the Cobb-Douglas Production Function with Application
...Show More Authors

  In this paper, the restricted least squares method is employed to estimate the parameters of the Cobb-Douglas production function and then analyze and interprete the results obtained.         A practical application is performed on the state company for leather industries in Iraq for the period (1990-2010).         The statistical program SPSS is used to perform the required calculations.

View Publication Preview PDF
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using Approximation Non-Bayesian Computation with Fuzzy Data to Estimation Inverse Weibull Parameters and Reliability Function
...Show More Authors

        In real situations all observations and measurements are not exact numbers but more or less non-exact, also called fuzzy. So, in this paper, we use approximate non-Bayesian computational methods to estimate inverse Weibull parameters and reliability function with fuzzy data. The maximum likelihood and moment estimations are obtained as non-Bayesian estimation. The maximum likelihood estimators have been derived numerically based on two iterative techniques namely “Newton-Raphson” and the “Expectation-Maximization” techniques. In addition, we provide compared numerically through Monte-Carlo simulation study to obtained estimates of the parameters and reliability function i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
Human Dignity and the Problem of Women Cutting Off Prayer: Women Cutting Off Prayer
...Show More Authors

Our creator has honored human beings and granted them a noble place, the provisions of the Islamic system are designed to strengthen and consolidate this dignity and respect. Since women are human beings, they have their respect, status and dignity. There are some prophetic sayings concerning women that may be understood as contrary to this value, the value of dignity and respect for human beings. One example is the Hadith of a woman cutting off a man’s prayer if she passed in front of his prayer. The study examines this topic and presents answers for it.

 

In dealing with the subject, the study followed the descriptive, analytical and deductive approach of mentioning legislative texts, analyzing them and deducing

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref