Form recurrence of financial crises phenomenon disturbing and attention , and returns the reasons so that its negative effects were sharp and dangerous , because of the nature and cause of Ncaha , threatened political and economic stability of the countries in which they occur these crises , in addition to Machmlh these crises spread of contagion across multiple channels to include other countries many developed and developing , and the reason for this to the openness of the economic and financial witnessed by the countries affected by crises and other countries concerned, the financial crisis is a case of financial turmoil appears in one of the sections of the financial system one and extends to
... Show MoreThis study has been carried out to evaluate the expression level of beta 2 microglobulin gene on patients infected by hepatitis C virus before and after treatment with interferon. The study included 117 hepatitis C patients comprising as 63 pre-treated patients, the range of age was between 20-65 year with a mean age of 48.12 ± 16.1 and 54 post-treated patients with age range was between 23-63 year with the mean of 46.1 ± 18.1. Also it was found that more than half of patients were located within third and fourth decade i.e. 30-49 year, with a percentage of 52.4% and 55.6 % for pre-treatment and post-treatment patients respectively. Moreover , regarding both groups, males are more than females with the ratio of ( 3.2:1) among p
... Show MoreThis study aims to identify the level of application of blue ocean leadership activities in public organizations and to build a conceptual and cognitive framework around this concept. The study adopted a descriptive-analytical approach, and the research sample consisted of (95) individuals from the senior management working at the center of the Iraqi Ministry of Communications (director general, department manager, section head). The data analysis technique used is structural equation modeling (SEM) and the Statistical Package for the Social Sciences (SPSS). The results indicate that the senior management in the Ministry of Communications is working to adopt the blue ocean leadership style through its activities, but not to the leve
... Show More
The aim of this research is to identify the Andalusia poet Abu Izac Al-Zauali , whose most of his poetry and biography had been lost, as well as many Andalusia poets. So this research is hoped to be the first step to shed the light on the poet’s life and poetry and to document his poetry as other writers do. It is also hoped that this research would pave the way , God willing , to the steps of finding more references about this poet .
Key Words: (Al-Zauali, Cordoba, Al-Ruaini choices, Andalusia Poetry , Almuahdi Era).
Abstract
Indeed, being busy with the understanding of religion is the best sort of worship that the almighty God has given each period of time a number of scholars and wise men. They receive what has been passed down to them from their great ancestors, and those who are willing to learn will learn, their students preserve their knowledge through teaching and writing. Thus, the scholars were pioneers in this field due to the value and importance of their knowledge. They have strived in learning, explaining, and writing new subjects.
One of those scholars is sheikh (Abdulrahman Al-Penjweni) who passed away 1319 AH in one of the villages of the city of Sulaimani in Iraq. He was one of the wisest scholars, a br
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MorePublic service motivation in public service organisations is one of the main problems that many developing countries have begun to experience, including Iraq. The public agenda is increasingly complex with reduced financial resources. In addition, these organisations have increased responsibilities with respect to the achievement of public goals and objectives as they are responsible for providing key services to members of the community (education, health and social work). This research is based on the degree of public service motivation among those working in health education and social work in public organisations, and aims to show the extent of the difference in the public service motivation of these employees according to di
... Show MoreThe security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreThe researcher has studied in his research (International Public Relations methods in building the state's image through Cyberspace)
, analytical study of the Facebook and twitter pages for British foreign office , the role was played by the International Public Relations in building the mental image of British , especially after the new media and internet have became influential role in political life . and became an important tools used by political institutions as ministries of foreign affairs in the twenty: one century .
The researcher identified the problem of this study with the following question:
(what is the role of the International Public Relations in building the mental image of state through Cyberspace)
To answer