The research aims to show the effect of some short-term debt instruments (central treasury transfers, cash credit granted to the government by commercial banks) on the production of the wheat crop in Iraq, through its effect on money supply during the period (1990-2018), As the study includes two models according to the statistical program (Eviews9), the first model included measuring the effect of short-term debt instruments on money supply, and the second measuring the extent of the money supply's impact on Wheat crop production, as the results of the standard analysis showed that the short-term debt instruments used in the model were Significant effect on wheat crop production indirectly through its effect on money supply, As
... Show MoreSome research reports that cognitive grammar (CG) theory has good contributions to teaching English as a foreign language. In this research, the researchers seek to apply this theory and its principles when teaching the simple present tense to Iraqi students who face difficulties in differentiating between the multiple usages of this tense. To achieve this objective, the researchers have conducted an experimental study on a group of 60 Iraqi students in the University of Baghdad, College of Education for Women. Langacker’s (2003) theory has been adopted in the analysis of the cognitive relations to understand the common and different connections of these usages of the simple present. The study has concluded that the cognitive grammar t
... Show MoreThe study aimed to measure the phsycological tolerance and self-efficacy among the students of Baghdad university and knon the significant differences in psychological tolerance and self-efficacy according to the variables (Gender-Specialization)and the interaction between themas well as the study aimed to identify the strength and direction of the relationship between psychological tolerance and self-efficacy of the study sampleincluded asample of the current study(370) students from grades four ,the researcher used the measure of psychological tolerance and self-efficacy prepared by the researcher ,and the results showed that college students Generally have adegree of psychological tolerance and that there are statistically sig
... Show MoreThe subject of demand on oil derivative has occupied an important position at present time in the daily life context. The fuel of benzene and gas oil and kerosene is one of basic elements of that concern, and on local , regional and international levels. The oil derivatives have played a leading role in determining the course and nature of development since early 1970 to the present time whether in the productive Arab countries or the importing. The researcher set out from the hypothesis that the increase of the local consumer demand on some of the oil derivatives is because of the internal and external factors accompanied by the inability of the productive capability and local production to confront this increase, and the resort
... Show MoreAbstract:
The use of economic resources enjoyed Iraq by especially oil resources, which constitute the main source of financial revenue, would the economic surplus outside the oil sector increases by mobilizing and rallying the labor power and turn it into an access capitalism, , was the cause of "the inaction of the productive sectors of the economy, made the investment planning process and even investment in human capital was not rationality with the increasing number of unemployed, particularly certificates and specializations high campaign, direction of the government towards market liberalism after 2003 through the, was focused not follow a clear economic policies, and the absence of planning
... Show MoreKnowledge management contribute to the overall private university libraries to develop libraries for the purpose of creating human and technological resources by investing research and development, as well as education and training for life.
This study followed the methodology of the descriptive and historical pillars of knowledge management for the years 1990 to the present day in 2017, depending on statistical figures obtained by the researchers from the General Secretariat of the Central Library at the University of Baghdad, and the Human Resources Division, which specialized human resources training after 2004 (and before those years from 1982 until 2002, where the continuing education was committee of the fixed committees are wor
The present research aims to identify and define the basic dimensions of the information management strategy and the administrative creativity in the Faculty of Management and Economics / the University of Kirkuk, as well as the role played by the dimensions of the information technology management strategy in achieving the administrative innovation in the college and the research problem was formulated in several questions. The research problem was formulated in several questions centered on the correlation between the research variables, and the research was based on a major hypothesis and five sub-hypotheses emerged from which it was subjected to several tests to ensure its validity. The researcher used the descriptive-analyti
... Show MoreBackground : In order for a tooth to erupt, two obvious requirements are needed. First, there has to be alveolar bone resorption of the bone overlying the crown of the tooth such that an eruption pathway is formed. Second, resorption of bony crypt and apposition of new one, third, there has to be a biological process that will result in the tooth moving through this eruption pathway.The amniotic sac contains a considerable quantity of stem cells. These amniotic stem cells are multipotent and able to differentiate into various tissues, which may be useful for human application. Receptor activator of nuclear factor kappa B ligand (RANKL) is concentrated on bone biology, more specifically bone metabolism. RANKL plays a vital role in osteoclast
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreTo date, comprehensive reviews and discussions of the strengths and limitations of Remote Sensing (RS) standalone and combination approaches, and Deep Learning (DL)-based RS datasets in archaeology have been limited. The objective of this paper is, therefore, to review and critically discuss existing studies that have applied these advanced approaches in archaeology, with a specific focus on digital preservation and object detection. RS standalone approaches including range-based and image-based modelling (e.g., laser scanning and SfM photogrammetry) have several disadvantages in terms of spatial resolution, penetrations, textures, colours, and accuracy. These limitations have led some archaeological studies to fuse/integrate multip
... Show More