بعد ثورة تموز عام 1958في العراق, لم يكن يسمح للقطاع الخاص بأن تكون له استثمارات كبيرة في القطاعات الاقتصادية. وذلك بسبب الإيديولوجيات التي كانت تؤطر الفكر السياسي. حيث كان النهج الاشتراكي هو الغالب في إدارة الأنشطة الاقتصادية. إذ قامت الدولة بتأميم معظم الاستثمارات الخاصة الكبيرة ،لاس
... Show More|
Building Information Modeling (BIM) is becoming a great known established collaboration process in Architecture, Engineering, and Construction (AEC) industry. In various cases in many countries, potential benefits and competitive advantages have been reported. However, despite the potentials and benefits of BIM technologies, it is not applied in the construction sector in Iraq just like many other countries of the world. The purpose of this research is to understand the uses and benefits of BIM for construction projects in Iraq. This purpose has been done by establishing a fr |
Iraq's oil industry has been passed in different periods , began with domination of Western companies to invest in Iraqi oil at twenties of the last century , through the process of nationalization of the shares of those companies , beginning of the seventies , and ending with the new policies adopted by the government recently, which was contracting with international companies to develop the oil industry , because of what the outcome of the oil industry from a decline in artistic and physical ability as a result to the conditions of war and embargo imposed on Iraq before 2003.
The Iraqi government has introduced licensing of a contract to
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreABSTRACT
The current research aims at highlighting the role of engagement of a sample of employees who works in some of the Iraqi private banks in terms of their interaction , commitment and enthusiasm and the positive impact they own regarding their job and devote their efforts to achieve the core purpose which is customer loyalty. The problem was expressed through a number of intellectual and practical questions.
In order to achieve the aim of the research the quantitative analytical method was used depending on a questionnaire as a basic tool to collect research data and the qualitative survey method depending on semi-structured interviews which were distrib
... Show MorePlumbago (Plumbaginaceae) is a genus of 10-20 species of flowering plants used in traditional Indian medicine, native to warm temperature to tropical regions of the world. The roots of Plumbago europaea, the Iraqi species of Plumbago, have been used for the treatment of cancer, rheumatoid arthritis, and dysmenorrhea. The main active constituents from dried powdered leaves and roots of Plumbago europaea were extracted by Soxhlet apparatus using ethyl acetate, the main active constituent was characterized by spectroscopic analysis (IR, 1H NMR, and 13C NMR) as plumbagin. Quantitative and qualitative study of plumbagin in the roots and leaves extracts was carried out by HP
... Show MoreWellbore instability is one of the most common issues encountered during drilling operations. This problem becomes enormous when drilling deep wells that are passing through many different formations. The purpose of this study is to evaluate wellbore failure criteria by constructing a one-dimensional mechanical earth model (1D-MEM) that will help to predict a safe mud-weight window for deep wells. An integrated log measurement has been used to compute MEM components for nine formations along the studied well. Repeated formation pressure and laboratory core testing are used to validate the calculated results. The prediction of mud weight along the nine studied formations shows that for Ahmadi, Nahr Umr, Shuaiba, and Zubair formations
... Show More