Sheikh Hanafi was born in one of the popular shops of Baghdad with interlocking social relations, and had a profound impact this camp where his talents in the first Venco loving to Mahalah and Baghdad and was born with this development since his days looked forward to the folklore and folk. In the middle of his youth, including authoring loves the heritage of folk legacies began in motion, from Baghdad, books, articles, research has brought him wide acclaim were not possible without the seriousness and diligence, independence and self-Asamath that mushroom on them
The trip was one of his tools in the scientific fame has gone to many Eastern and Asian countries and visited religious and literary institutes and delivered the lectures an
Schools and artistic trends derive their themes from artistic styles and styles as methods followed by the artist to express his themes embodied in the values of artistic and plastic elements as symbols and signs that can be described according to the type of art school and the extent to which the artist is influenced in employing them as a goal to achieve the plastic achievement in the painting, and from those vocabulary (human beings nature Life) as encoded messages that have an appearance and an interior, the appearance of which are forms, colors, formats and distributions of space and their interior meanings and semantics embody attitudes, events and circumstances that stem from the social depth and daily life and derive their comp
... Show MoreThe current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, name
... Show MoreCeruloplasmin (Cp) is one of the acute phase protein, in this review ,we studied the level of ceruloplasmin with copper (Cu) and iron in 90 patients with coronary heart diseas ( those patients are divided into three groups, whom are stable angina , unstable angina and myocardial infarction compared with 30 healthy volunteers) and the roles of them as diagnostic and prognostic tools.The diagnosis was attend by a clinical examination carried out by the consult medical staff in Ibn AL-Nafis hospital. The result: ceruloplasmin recorded a significantly(p<0.05)higher level in all patient groups compared with the control, so this result supports the hypothesis that a high serum ceruloplasmin level is a risk factor for coronary heart di
... Show MoreThe smart city concept has attracted high research attention in recent years within diverse application domains, such as crime suspect identification, border security, transportation, aerospace, and so on. Specific focus has been on increased automation using data driven approaches, while leveraging remote sensing and real-time streaming of heterogenous data from various resources, including unmanned aerial vehicles, surveillance cameras, and low-earth-orbit satellites. One of the core challenges in exploitation of such high temporal data streams, specifically videos, is the trade-off between the quality of video streaming and limited transmission bandwidth. An optimal compromise is needed between video quality and subsequently, rec
... Show MoreIn this paper, a compartmental differential epidemic model of COVID-19 pandemic transmission is constructed and analyzed that accounts for the effects of media coverage. The model can be categorized into eight distinct divisions: susceptible individuals, exposed individuals, quarantine class, infected individuals, isolated class, infectious material in the environment, media coverage, and recovered individuals. The qualitative analysis of the model indicates that the disease-free equilibrium point is asymptotically stable when the basic reproduction number R0 is less than one. Conversely, the endemic equilibrium is globally asymptotically stable when R0 is bigger than one. In addition, a sensitivity analysis is conducted to determine which
... Show MoreA specialized irradiation instrument "created instrument" was designed and created from various kinds and sizes of available plastic household-waste materials. In addition, a neutron beam collimator with a lid was designed and implemented. The collimator is with dimensions of 25 cm in height and 10 cm in inner diameter, while the lid dimensions are 11.5 cm height and outer diameter of 9.9 cm to perfectly match the inner diameter of the collimator with the possibility of movement (opening and closing), and also the shielding of the radioactive 241Am/Be neutron source with a recent activity of 37.5 mCi.
To investigate the efficiency of the "created instrument", ten hydrogenous material samples (ordinary p
... Show MoreDue to rapid urbanization and industrialization that occurred in Al- Muthanna province in southeastern Iraq during the last decade, pollutants such as heavy metals were emitted into the environment and became a serious threat to human health. Environmental pollution could be caused by different types of pollutants, which come from different sources.
This study aims to assess the environmental magnetism efficiency for heavy metal pollution assessment using the magnetic susceptibility technique which became a more rapid and cost-effective compared to conventional methods. Increasing heavy metal contents in soils causes an increase in the magnetic mineral concentration. The study are
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show More