The research aims to know the influence of the intellectual capital on the internal control system in a sample of General Inspection Offices in Iraq. The research includes a sample of individuals who are working in these offices total sample (46) individuals distributed according to functional levels (General Inspector, Deputy Inspector General, and Director) , The data and information were collected by using questionnaire, which is done for this purpose, as well as personal interviews in order to reach to the results that achieve the aim of this research , Two hypotheses were formed , the first hypothesis consists of (4) secondary hypothesis , All these hypotheses were tested by using statistical tools such as (percentages, freq
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no
... Show MoreThe current study aimed to determine the relation between the lead levels in the blood traffic men and the nature of their traffic work in Baghdad governorate. Blood samples were collected from 10 traffic men and the age about from 20-39 year from Directorate of Traffic Al Rusafa/ Baghdad and 10 samples another control from traffic men too with age 30-49 year and they livedrelatively in the clear cities or contained of Very few traffic areas. The levels of lead in blood estimated by used Atomic Absorption Spectrometry.
The result stated that there is no rising of the levels of lead in blood of traffic men Lead concentration was with more a range from 14 ppm in Traffic police are not healthy They are within the permissible limits, Ap
This study relates to the estimation of a simultaneous equations system for the Tobit model where the dependent variables ( ) are limited, and this will affect the method to choose the good estimator. So, we will use new estimations methods different from the classical methods, which if used in such a case, will produce biased and inconsistent estimators which is (Nelson-Olson) method and Two- Stage limited dependent variables(2SLDV) method to get of estimators that hold characteristics the good estimator .
That is , parameters will be estim
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More

