This article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show MoreThis work is concerned with building a three-dimensional (3D) ab-initio models that is capable of predicting the thermal distribution of laser direct joining processes between Polymethylmethacrylate (PMMA) and stainless steel 304(st.st.304). ANSYS® simulation based on finite element analysis (FEA) was implemented for materials joining in two modes; laser transmission joining (LTJ) and conduction joining (CJ). ANSYS® simulator was used to explore the thermal environment of the joints during joining (heating time) and after joining (cooling time). For both modes, the investigation is carried out when the laser spot is at the middle of the joint width, at 15 mm from the commencement point (joint edge) at traveling time of 3.75 s. Process par
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreGroundwater modelling is particularly challenging in arid regions where limited water recharge is available. A fault zone will add a significant challenge to the modelling process. The Western Desert in Iraq has been chosen to implement the modelling concept and calculate the model sensitivity to the changes in aquifer hydraulic properties and calibration by researching 102 observations and irrigation wells. MODFLOW-NWT, which is a Newtonian formulation for MODFLOW-2005 approaches, have been used in this study. Further, the simulation run has been implemented using the Upstream-Weighting package (UPW) to treat the dry cells. The results show sensitivity to the change of the Kx value for the major groundwater discharge flow. Only abo
... Show MoreBackground Rectal cancer is one of the most common malignant tumors of gastrointestinal tract. Combining chemotherapy with radiotherapy has a sound effect on its management.
Objectives Assessment the patterns of characterizations of rectal cancer. Evaluation of the efficacy, and long-term survival of pre-/ postoperative chemoradiation. Collecting all eligible evidence articles and summarize the results.
Methods By this systematic review and meta-analysis study, we include data of chemoradiation of rectal cancer articles from 2015 until 2019. The research was carried out at Baghdad Medical City oncology centers. Accordance with the
KE Sharquie, AA Noaimi, MS Younis, BS Al-Sultani, Journal of Cosmetics, Dermatological Sciences and Applications, 2014 - Cited by 5
The aim of this research is subjected to discover The Dictation mistakes which occur
widely in the Arabic Language written by Iraqi – News papers.
The research classified These Mistakes in Three groups as Follows:
1. The first group dealing with distinguishing between the Arabic – letter ) ا ( When Written
or ) أ ( at The beginning The word and as ) ئ ( which differ in meaning from each other .
2. The second group dealing with the writing of The Arabic ) ٙ( and as ) ٛ( at the end of The
word which differ in meaning from each other.
3. The Third group dealing with distinguishing in written The Arabic letter as ) ض( or as ) )ظ
which differ in meaning From each other.
4. The fourth group dealing with Th
The Iraqi- Kuwaiti relations had witnessed a lot of problems which had its impact on them, at the fore front is the frontier issue, and the Iraqi invasion of Kuwait in 1990 which led to the severance of relations between them and had strengthened the disagreement and the dispute and raised the animosity and tension.
After 2003, Iraq has witnessed a lot of changes which affected Iraq and the region as a whole.
Under the new political developments in Iraq, a now phase has started in the relations between the two parts. which is based on the emphasis on building new relations based on the mutual respect and non intervention in the internal affairs of both countries, and in accordance with the principles of the international law, and w