Abstract
It considers training programs is an important process contributing to provide employees with the skills required to do their jobs efficiently and effectively, so it should be concerned with and the focus of all government our organizations, and perhaps the most important reasons that I was invited to select the subject (evaluation of training programs directed toward the diagnosis of the phenomenon of financial and administrative corruption) It is the importance of those programs working in the regulatory institutions General and the Office of Inspector General of Finance and the Ministry particularly for employees because of their role in the development of their skills and their experience and their beha
... Show MoreCities witnessing mass-gathering events, such as Kerbala-Iraq, are peculiar in respect to their needs in controlling tuberculosis. DOTS was implemented in Kerbala almost two decades ago. GeneXpert MTB/RIF assay is adopted in the hope to escalate case detection rates, however, its performance is not evaluated yet. Records of 3254 patients suspected to have pulmonary TB whom they referred to the chest and Respiratory illnesses center of Kerbala governorate were analyzed. The overall trends of TB detection rates showed declining pattern over the year before the adoption of GeneXpert MTB/RIF. In the year of adoption of Xpert MTB/RIF, the detection rates raised, then after declined again. The GeneXpert MTB/RIF has add
... Show MoreBackground: Directly observed therapy-short course (DOTS) had been adopted by World Health Organization (WHO) as hopeful strategy for treatment of tuberculosis (TB) since early nineties. Iraqi health authorities started DOTS implementation since 2001 in Baghdad. Coverage expanded gradually till 100% in 2004. War and unstable security condition hit Iraq since March 2003. Objective: The objective of this study was To evaluate the DOTS implementation program in Baghdad in different periods including 2 unstable periods for proper assessment of war and instability on treatment of TB. Patients and methods: This study had been conducted in Baghdad during four different periods (before and during 2003 war, after war; without and with DOTS). Dire
... Show MoreIn this research, new Schiff base is derived from chitosan O-nitrobenzyldehyde and its complexes were synthesized. All compounds were characterized by FT-IR, UV-Visible, TGA, DTA, TG and molar conductivity with melting point. The results showed that Schiff base was coordinated via nitrogen atom azomethine with the center metal ions Co+2,Ni+2 and Cu+2 behaving monodentate ligand and forming complexes with molecular formula [M(L)Cl2H2O] The tetrahedral geometrical was suggested for all prepared complexes based on the characterization data for all techniques. +2,Cu+2, Ni+2M = Co
This work involved the co-substitution of the two bioactive ions of strontium and magnesium into the hydroxyapatite (HA) coating which was then electrochemically deposited on Ti-6Al-4V ELI dental alloy (Gr.23) before and after treatment by Micro Arc Oxidation (MAO). The deposited layers were characterized by scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The adhesion strength of the coating layer was estimated by using pull-off adhesion test. The adhesion strength of Sr/Mg-HA on the Ti-6Al-4V ELI dental alloy after MAO treatment was 1.79 MPa, which was higher than that before MAO treatment (1.62 MPa). The corrosion behavior of th
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreImportance of Arabic language stemming algorithm is not less than that of other languages stemming in Information Retrieval (IR) field. Lots of algorithms for finding the Arabic root are available and they are mainly categorized under two approaches which are light (stem)-based approach and root-based approach. The latter approach is somehow better than the first approach. A new root-based stemmer is proposed and its performance is compared with Khoja stemmer which is the most efficient root-based stemmers. The accuracy ratio of the proposed stemmer is (99.7) with a difference (1.9) with Khoja stemmer.
There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.