As long as Islamic banks cannot operate in an environment that deals with traditional banking instruments based on the interest rate (bank interest) that is prohibited by Article No. (6) of the Islamic Banking Law No. (43) of 2015 which stipulates that (do not deal in any activity that carries Interest (neither taking nor giving)). Therefore it seeks to provide an alternative strategic solution within the framework of the provisions and rules of Islamic Sharia, on the basis of participating in profit and loss to avoid the method of interest taking and giving, to find investment methods to provide new financial products, such as Islamic certificates of deposit and investment funds according to the method Murabaha, speculation (Mudar
... Show MoreAllowing Iraqi companies to use multiple systems and policies leads to varying levels of disclosure and no high symmetry between report preparers and users, and that the adoption of integrated reporting can reduce information asymmetry. The theoretical side addressed the concepts of these variables, and in the practical side the binary variable (0, 1) was used. To compensate for the value of the independent variable (integrated reporting) based on the Central Bank of Iraq’s classification of banks according to the (CAMLES) index, and the dependent variable (information asymmetry) was measured through two measures (price difference, unusual return), the research community was represented by (5) Banks out of the total of banks li
... Show MoreThe role of filamentous bacteria represented by Streptomycessp was studied as biological treatment for activated sludge AL- Restomia treatment unit in Baghdad city. The result shows reducing in phosphate concentration where apprise in started entrance the treatment unit 12.083 mg/L fast the unit stages reached to 8.426 mg /L where nitrate concentration apprises 3.59 mg/l and ending in 2.43 mg/L The concentration of ammonia apprises 1358 mg/L and reached to 140 mg/L. also the TDS concentration reduced from 1426 to 1203 mg/L where nutrient which represented (SO4, Mg, Ca, Na, K) reduced by range 30.883- 23.337 , 194- 121 , 440- 321 , 109.03- 101.53 and 16.85- 15.4mg/L respectively COD reduce from427.263- 82mg/L with absorbance0.018- 0.027
... Show MoreThe current study sheds light on the measurement and estimation of the radioactivity of radionuclides (238U, 226Ra, 232Th, and 40k) in natural waters of different regions of Nineveh Governorate in Iraq.15 samples were collected from different sources of natural waters, where gamma-ray spectroscopy was used using NaI)TI) sodium iodide detector to determine the concentration of radioactivity in the samples. According to the results, the radioactivity concentration in the tested water sample were ranged from 0.36 ± 0.04-1.57 ± 0.09with an average value of 0.69 ± 0.06 Bq/l for 238U, and 2.9 ± 0.02-0.88 ± 0.03 with an average value of 0.65 ± 0.03 Bq/l for 226Ra Bq/l
... Show MoreThe aim of this study is to evaluate the implementation of ICT applications in public service organizations, which is responsible for the implementation of public policy. The study examined the success of ICT in achieving its goals by meeting the main needs of the community members which is the first requirement in the success of sustainable development plans before determine the capabilities of ICT. The main pillar of success in the implementation of ICT systems is the key to improving the efficiency of the organization's performance. This is a reflection of the effectiveness and quality of the services provided to its beneficiaries. The study concluded that the current level of capabilities of individuals working in public organizations i
... Show MoreThe study aimed to investigate the relationship between empowerment strategies and their impact on the success of enrichment work, it included the dimensions of empowerment strategies (power, knowledge, information, rewards), The dimensions of Job enrichment are (Skill variety, Task identity, Task significance, Autonomy, Feedback). The study was conducted at the headquarters of the Iraqi Oil Ministry in Baghdad and was based on a sample of the leadership of the ministry of managers consisting of 215 people. The data were collected using the questionnaire method based on scientific standards adopted in previous st
... Show MoreAim: The study aimed to investigate the presence of the specific B1 gene T gondii in blood and milk samples from natural infected cattle and pregnant women (16-30 weeks) whose examination performed by the officers at the women's and children's Educational hospital in Al-Diwaniyah, Iraq. Materials and methods: A total of 150 serum samplings were collected analysed and scanned for Anti-T gondi antibodies (75 naturally-infected goats and 75 pregnant women with Toxoplasma). Polymerase chain reaction (PCR) was used to detect of B1(399pb) gene in 26 goat's blood samples and 7 samples from pregnant women. Results: A quick-test anti-cassette gondii results showed 26 positive samples of goats in a percentage of 34,666 percent, while a higher percent
... Show MoreStaphylococcus aureus is one of the common causative agents of infections, from asymptomatic carriers to healthy individuals. It can colonize anterior nares of carriers with a high capability to resist different antibiotics. Students are susceptible to bacterial infection due to some factors, including poor health habits and surrounding school conditions. This study screened the rate of vancomycin- and methicillin- resistant Staphylococcus aureus nose carriers among secondary students in rural and urban schools and its association with some sociodemographic factors. The study sample included 300 male/female students aged 15-20 years from 12 schools of rural and urban areas during the period from November 2020 till May 2021. It was fo
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More