The current research aims to first - reveal the social repercussions of COVID-19 on women A - The impact of the epidemiological crisis on the social structure of the family B - Psychological and social pressures that women are exposed to during the Covid pandemic C - Social isolation resulting from the injury of a member Second - Understanding the health consequences of COVID-19 on women A- Mechanisms of differentiation in the treatment of Covid-19 treatment, home or hospital As for the limits of the research, the current research is determined by some private universities of students, female employees and teaching staff in Karkh district, which number eight (Al-Hikma, Al-Farahidi, Al-Farabi, Tigris, AlTurath, Al-Rashid, Al-Mashreq, Al-Nusour) for the academic year 2020-2021 AD. The current research relied on the descriptive analytical approach, The research community was limited to all women affiliated with private universities located in the city of Baghdad, including female students, teachers and employees on the Karkh side only, who were withdrawn from (8) private universities, and their number is (20526) women, with a rate of (19298) female students, and (579) An employee, and (649) female teachers for the year (20202021), the researchers built a questionnaire for the health and social repercussions of the epidemiological crisis (Covid-19) on women. The researchers are conducting research aimed at studying the mutant covid-19 micron, especially in the current stage, and conducting extensive research on vulnerable groups and covid-19 mutant in the current stage
The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
This research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show MoreThis work aims to introduce the concepts of left and right derivations in an AT-algebra and discuss some interesting theorems of these concepts. Also, a fuzzy derivation of an AT-subalgebra, a fuzzy right (left) derivation ideal, a fuzzy derivation of AT-subalgebra, and a fuzzy right (left) derivation ideal are studied. Finally, a level derivation of AT-algebras is defined and some propositions are achieved.
Many isolated rural communities are located in regions where there is an abundant and reliable supply of solar energy, but where the distance to the nearest power station is many tens or even hundreds of kilometre. It is therefore mainly in these areas that rural electrification is now being provided by PV generators. since Stand-Alone PV generator can offer the most cost-effective and reliable option for providing power needed in remote places. Accordingly these isolated rural canters are fitted with PV for lighting, a refrigerator, a television and socket to supply kitchen appliances
In The Name of Allah Most Gracious Most Merciful
The characteristics of the doers of good are mentioned in the Holy Book of God, and love for them in five places, and whoever God loves, honors him and gives him victory. As for the love of the righteous, it has to do with loyalty, covenant, and integrity. Committing sins 0 Then after that he mentioned God those who fight in His cause and those who rely on Him and return to Him and turning away from everything else.
The tagged research (realism in the Paintings of Iraqi Kurdistan artists, “a study of expression methods”) dealt with realism in an objective way, as well as the complexity of its concepts through its formations and formations. On realism and its historical dimension in concept and meaning, as for the second chapter, the research was focused on the methods of expression in painting, while the third chapter was concerned with the procedural applications of realistic methods of expression in the drawings of Iraqi Kurdistan, and according to these axes and to achieve the goal of the research, a number of Among the results are:
1- Realism documented the life of the Kurdish society in line with the developments of the era, as the sty
Pollen grains morphology have been studied for the wild species of the genus Erysimum L. which belong to Crucifereae family in Iraq. These species are E. filifolium Boiss. et Hausskn., E. oleifolium J. Gay, E. repandum L., E. eginense Hausskn. ex Bornm., E. aucheranum J. Gay, E. cheiranthoides L., E. alpestre Ky. ex Boiss., E. kurdicum Boiss. et Hausskn., E. tenellum DC., E. strophades Boiss., E. gladiiferum Boiss. et Hausskn., E. nasturtioides Boiss. et Hausskn. The study was performe by using light microscope . The study reveal that there was only one type of pollen grain named Tricoplate in all studied species . The study also demonstrated that there were differences among pollen grains morphology . The species E. kurdicum , E. alpestre
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreThe aim of this research is to diagnose the impact of competitive dimensions represented by quality, cost, time, flexibility on the efficiency of e-learning, The research adopted the descriptive analytical method by identifying the impact of these dimensions on the efficiency of e-learning, as well as the use of the statistical method for the purpose of eliciting results. The research concluded that there is an impact of the competitive dimensions on the efficiency of e-learning, as it has been proven that the special models for each of the research hypotheses are statistically significant and at a level of significance of 5%, and that each of these dimensions has a positive impact on the dependent variable, and the research recommended
... Show More