Preferred Language
Articles
/
ZheH6pIBVTCNdQwCbsOY
Management's responsibility for breach of investment administrative contracts
...Show More Authors

View Publication
Publication Date
Thu Jul 10 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Immunohistochemical expression of P53, as a marker of apoptosis in Hodgkin’s and Non Hodgkin’s lymphoma of the head and neck region
...Show More Authors

Background: Malignant lymphomas represent about 5% of all malignancy of the head and neck region which can involve lymph nodes as well as soft tissue and bone of the maxillofacial region. Apoptosis is considered a vital component of various processes including normal cell turnover, proper development and functioning of the immune system. Inappropriate apoptosis is a factor in many human conditions including neurodegenerative diseases, ischemic damage, autoimmune disorders and many types of cancer. Expression of p53 Proteins in Hodgkin׳s and Non Hodgkin׳s lymphomas suggested that it can help in monitoring of patients and the markers may aid in controlling the progression of lymphoma and detect the degree of aggressiveness of the diseas

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Robust Estimations of Cluster Analysis: Practical Application in Administrative and Financial Corruption
...Show More Authors

Cluster analysis (clustering) is mainly concerned with dividing a number of data elements into clusters. The paper applies this method to create a gathering of symmetrical government agencies with the aim to classify them and understand how far they are close to each other in terms of administrative and financial corruption by means of five variables representing the prevalent administrative and financial corruption in the state institutions. Cluster analysis has been applied to each of these variables to understand the extent to which these agencies are close to other in each of the cases related to the administrative and financial corruption.           

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
THE QURAANIC REITERATION IN AL- JAAHED S THOUGHT
...Show More Authors

0

View Publication Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modules with Chain Conditions on S-Closed Submodules
...Show More Authors

  Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called  s- closed submodule denoted by  D ≤sc W, if D has   no  proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In  this  paper,  we study  modules which satisfies  the ascending chain  conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.

View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
The Poetics of Transition in T. S. Eliot's "Ash-Wednesday"
...Show More Authors
  1. S. Eliot is one of the important founders of the modernist movement in literature, a cutting-edge poet of the first order. After his 1927 conversion to Anglicanism, he began calling himself a conservative, royal, and a classicist.
  2. "Ash Wednesday" is the first long poem written by him after his conversion. It deals with the struggle that ensues when one who has lacked faith acquires it. It is richly but ambiguously allusive, and deals with the aspiration to move from spiritual barrenness to hope for human salvation.

    "Ash Wednesday" not only struggles with an approach to faith but with an approach to a language capable of expressing it. Eliot's style is different from that that predates his conve

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
PROMOTE HUMAN RIGHTS IN CONSUMER PROTECTION AGAINST ENVIRONMENTAL, HEALTH, LEGAL, ADMINISTRATIVE AND CORRUPTION: PROMOTE HUMAN RIGHTS IN CONSUMER PROTECTION AGAINST ENVIRONMENTAL, HEALTH, LEGAL, ADMINISTRATIVE AND CORRUPTION
...Show More Authors

Consumer protection requires seeking one official entity to accomplish its tasks. The large number of devices control and implementation in it, return to several ministries, and executive bodies lose coordination and cooperation, and unite efforts to eliminate the types of fraud and control the quality of production within the approved standards. This is in addition to the seriousness of the existence of administrative and legal corruption which hinders the role of inspection committees and representatives of official bodies with the relationship and prevents them from carrying out their duties entrusted to them or presenting them with administrative complications to thwart their duties in consumer protection. This is despite the

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The reality of administrative creativity of secondary schools' managers in Al-zarqaa province
...Show More Authors

The study focuses on identifying the reality of administrative creativity of secondary schools' managers in Al-zarqaa province. The descriptive approach was adopted to conduct this study. To achieve the study objective, the author designed a questionnaire composed of (24) items included (4) domains applied on (80) male and female school managers were selected randomly. The results showed that the administrative creativity level of secondary school's managers over all domains were too high which ranked as school management domain followed by public community domain then teacher domain and finally, school environment domain. Additionally, each of male, private sector, and experience over 10 years revealed significant differences.

View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Examining the Asymmetric Impacts of Interest and Exchange Rate on Investment in Egypt for the Period 1976-2020: Applying NARDL Model
...Show More Authors

Most of the studies conducted in the past decades focused on the effect of interest rates and exchange rates on domestic investment under the assumption that the independent variables have the same effect on the dependent variable, but there were limited studies that investigated the unequal effects of changes in interest rates and exchange rates, both positive and negative, on domestic investment.  This study used a nonlinear autoregressive distributed lag (NARDL) model to assess the unequal effects of the real interest rate and real exchange rate variables on domestic investment in Egypt for the period 1976 - 2020.  The results revealed that positive and negative shocks for both exchange rates have unequal effects on

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
Wastewater Bio-solids Management for Fertilizer Quality Using Co- composting Process
...Show More Authors

Co-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a

... Show More
View Publication
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref