Oral squamous cell carcinoma (OSCC) is the most common malignant neoplasm of the oral mucosa. Human papillomavirus (HPV) virus cause a broad scope of diseases from benign to invasive tumors, types 16 and 18 classified as carcinogenic to humans. This study aimed to provide the first molecular characterization of HPV types in Iraq. Thirty-five unstimulated whole saliva samples were collected from histopathologically confirmed patients with oral cancer were enrolled in this study. Genomic DNA was extracted from exfoliating cells to amplify HPV-DNA using HPV-L1 gene sequence primers by polymerase chain reaction method (PCR), the viral genotyping was performed using direct sequencing method. HPV genotypes identified were deposited in Gen
... Show MoreAbstract
were determine the problem of current research to answer the question on the consciousness of the Ministry of Agriculture to adopt Staffing strategy and identify the shortcomings as the independent variable, represented by the three dimensions (recruitment , selection, placement) and its impact on high performance, as dependent variable is described in four dimensions (leadership, strategy, structure and processes, culture), in this research were Used analytical descriptive style . This research aims to identify the correlation and impact of Staffing strategy at high-performance in Ministry of Agriculture , To clarify the relationship between
... Show MoreThis research aims to study the degree to which human resources re-engineering programs contribute to enhancing the morale of employees , as it constitutes re-HR Software Engineering contemporary trend to redesign activities and tasks that can HR do a way that helps their organization to achieve its goals as part of the operating environment including dealing with all activities related variables, and the promotion of workers' morale is one of the selections that have to be addressed so that the senior management helps the organization to invest their human resources best possible way as posing the most valuable and rarest of resources enjoyed by comparison with her competitors.
The research problem has
... Show Moreدور التدقيق الاستراتيجي لإدارة الموارد البشرية في بلورة القدرات التنظيمية دراسة استطلاعية في رئاسة جامعة بغداد
This research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show MoreAbstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
This paper aims to build a modern vision for Islamic banks to ensure sustainability and growth, as well it aims to highlight the positive Iraqi steps in the Islamic banking sector. In order to build this vision, several scientific research approaches were adopted (quantitative, descriptive analytical, descriptive). As for the research community, it was for all the Iraqi private commercial banks, including Islamic banks. The research samples varied according to a diversity of the methods and the data availability. A questionnaire was constructed and conducted, measuring internal and external honesty. 50 questionnaires were distributed to Iraqi academic specialized in Islamic banking. All distributed forms were subject to a thorough analys
... Show More