this research concern with material function subject by using it in Baghdad education in formational places , because it considered as one of the most important spaces which needs a material presentation for the interior consistings that shares with prepairing the right mode for thos who use these spaces, regarding to that this research includes four chapters: Chapter one: concern with the research problem represented by the following question: can we use the material to place the hole spaces of information place ? So the aim of the research seems very obvious in functioning the material these places, and to take a close view on the importance of the research the theory , implementation and objective limits also concerning the terminolog
... Show MoreAbstract In light of the changing conditions that prevail in society, and the intense competition that institutions and countries are forced to face, especially after the opening of markets, and the transformation of the world into what is called a small village, entrepreneurship has emerged as an important tool for dealing with the developments of societies, whether it is related to individual business projects or Economics for national business, leadership was the key to any driving force towards achieving growth. Today, women are no longer captive to a specific orientation, but rather all horizons and fields of work have been opened to them, and they have been able to occupy the most important economic, voluntary, service, and
... Show More
Abstract
The resources-based introduction in the study of business organizations is increasingly dealing in the study of the human capacities and the best ways to develop them and changing the resources of the organization to be essential and competent to face the business challenges. Today’s organizations need crucial practices to face those challenges and the influences of those practices which take into consideration the importance of developing the entrepreneurship inside the organization. Those practices are called “High Performance Work Systems” which is denoted by “HPWS” and defined as the practices of human resources management which help in acquiring func
... Show MoreMK Al-Janabi, NA Nasir, RK Jaber, AO Oleiwe, Iraqi Postgraduate Medical Journal, 2018 - Cited by 7
Rheumatoid arthritis (RA), is an autoimmune, and inflammatory disease that is closely related to the destruction of cartilage and bone. DC-SIGN are important types of C-type lectin receptors (CLRs), expressed on dendritic cells and macrophages, and have a central role in regulating innate and adaptive immunity, function as pattern recognition receptors, and as cell adhesion molecules. Recent evidence has demonstrated that DC-SIGN is involved in the pathophysiological of chronic inflammation, so DC-SIGN has been linked to several autoimmune and may play an essential indicator in the pathogenesis and progression of RA. Therefore, the purpose of this study is to determine the serum level of DC-SIGN in RA patients, as well as the level of DC
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt