Nonalcoholic fatty liver disease in a group of Iraqi obese children attending children welfare teaching hospital
The research aims to identify the role of the dimensions of financial inclusion in achieving the competitive advantage by An exploratory research of the views of a sample of customers of the 20 Algerian commercial banks, And the relationship between its dimensions (Access dimension, Usage dimension, Quality) And competitive advantage. This research is based on the analytical descriptive approach. The questionnaire was adopted as a main tool in collecting data and information on the sample of 377.
The The research showed several results, the most important of which is a strong correlation between the dimensions of the three financial inclusion combined and the competitive advantage of the Algerian commercial banks, and explained t
... Show MoreThe study aims at elicitation the morals strategies from sunnah depending on the analytic-qualitative method. It revealed a comprehensive integrated system of creative strategies to improve morals. It was categorized into three areas: cognitive strategies, affective strategies, and some strategies based on self-initiative and practice. The researcher recommended that teachers and educators should employ these effective strategies in the process of moral guidance for the Muslim generation. He also recommended that researchers should put more effort to do more In-depth qualitative studies, which must be directed to establish the origin of different education strategies from the Holy Qur’an, the Sunnah, and Muslim scholars’ legacy.
The family Ormyridae has been very much neglected by workers and only two species has been recorded so far from Iraq. The present study, based mainly on my collection, deals with five species, of which one is new to science. The new species is described together with notes on locality data, host records, distribution and taxonomical remarks for all the species.
This work provides an analysis of the thermal flow and behavior of the (load-free) refrigerator compartment. The main goal was to compare the thermal behavior inside the refrigerator cavity to the freezer door (home refrigerator) effect and install a fan on the freezer door while neglecting the heat transmitted by thermal radiation. Moreover, the velocity distribution, temperature, and velocity path lines are theoretically studied. This was observed without affecting the shelves inside the cabinet and the egg and butter places on the refrigerator door as they were removed and the aluminum door replaced with a glass door. This study aims to expand our knowledge about the temperature and flow fields of this refrigerator mo
... Show MorePricing has an important position among the elements of marketing mixture (4ps) as it represents revenues that in turn represent one of the important pillars' for resources affecting on organizations sustainability and development , and the failure in determining prices and their strategies has a dangerous effect on the organizations reality and future as a whole . from this point, this is what from the focus of the research problem,which centered on how to get companies to critical price that satisfies customers and achieve corporate objectives.
... Show MoreThis study aimed to measure the accounting conservatism and the lemited factors which affected on it in the annual financial reports of insurance companies which listed on the Amman Stock Exchange during the period from 2005 to 2016, these factors were represented by firm age, firm debt and firm size.
Using the market value model (MV) To book value ( BV) Beaver and Ryan (2000) The level of the accounting conservatism was measured. The study found that the insurance companies which are listed on the ASE exercise the accounting conservatism when they were preparing financial reports. And when conducting a process of the test of the affected of the factors (The age of the
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the