Preferred Language
Articles
/
ihcCAJMBVTCNdQwCesQC
Foreign direct investment and economic growth literature review from 1994 to 2012
...Show More Authors

Foreign direct investment (FDI) has been viewed as a power affecting economic growth (EG) directly and indirectly during the past few decades. This paper reviewed an amount of researches examining the relationships between FDI and EG, especially the effects of FDI on EG, from 1994 up to 2012. The results show that the main finding of the FDI-EG relation is significantly positive, but in some cases it is negative or even null. And within the relation, there exist several influencing factors such as the adequate levels of human capital, the well-developed financial markets, the complementarity between domestic and foreign investment and the open trade regimes, etc.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 24 2018
Journal Name
Chalcogenide Letters
STUDY OF GEOMETRICAL AND ELECTRONIC PROPERTIES OF ZnS WURTZOIDS VIA DFT
...Show More Authors

Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Terrorism and Internal Displacement in Iraq: A Field Study in Baghdad
...Show More Authors

    Terrorism is a serious problem for many societies today. This research aims to identify the impact of terrorism and displacement crisis on human security, which was a shock to the Iraqi society in terms of its impact on the psychological, social and economic conditions of the individual, family, and society. The variety of methods of carrying out the terrorist operations that resulted from the phenomenon of human displacement witnessed by Iraq since the middle of 2014. This phenomenon has its demographic, political and social dimensions.

    In order to achieve the goal of this study and the importance of the subject, the social survey method was used by selecting a sample of 200 IDPs in a compou

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
The Spectroscopic Behaviour of Rhodamine 6G in Liquid and Solid Solutions
...Show More Authors

Absorption, fluorescence, quantum yield and lifetime of rhodamine 6G in chloroform, methanol and dimethyl sulfoxide were measured. From a comparison of these quantities, with those for solid solutions (solid solutions are obtained by mixing constant volume proportions of dye at a concentration of 1*10-4M/l with different volume proportions from the concentrated solution of polymer in chloroform and dimethyl sulfoxide). The results showed that the addition of polymer to liquid concentrated solutions (1*10-4M/l )of rhodamine 6G dye from expecting [which leading to development active medium for laser dye at high concentration] increase the spectra shift toward high energies, and the luminescence quantum yield but decreasing radiative lifetim

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
Moderation between the anvil of application and the hammer of extremism
...Show More Authors

This research study focuses on fundamental questions. It deals with the content of the critical reviews through which the most important sources that undermine the renaissance of the Islamic human society can be concluded. It is the vague fetishization of the sacred between religion, politics, and ideas, which members of society live in  and which raised the dust of closed-minded fanaticism that led to the return of deviant extremism. It is oppression, violence, and domination, all of which are professional tools in the manufacture of the ideology of extremism in all its forms. Here,  the idea matured in giving a human, intellectual and philosophical overview that mixed the required drawing in the formulation of scientific cont

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Wed Dec 04 2024
Journal Name
F1000research
Correlation between plasma homocysteine and ischemic heart disease in young Adults
...Show More Authors

Background Cardiovascular disease (CVD) is a leading cause of death worldwide. Ischemic heart disease is a major cause of morbidity and mortality. Lack of blood supply to the brain can cause tissue death if any of the cerebral veins, carotid arteries, or vertebral arteries are blocked. An ischemic stroke describes this type of event. One of the byproducts of methionine metabolism, the demethylation of methionine, is homocysteine, an amino acid that contains sulfur. During myocardial ischemia, the plasma level of homocysteine (Hcy) increases and plays a role in many methylation processes. Hyperhomocysteinemia has only recently been recognized as a major contributor to the increased risk of cardiovascular disease (CVD) owing to its eff

... Show More
View Publication
Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Journal Of The College Of Education For Women
Kinds of unknowns and government linkages -empirical study of the application
...Show More Authors

It is no secret that the prophets speech is of great importance, as the second source of Islamic legislation after the Holy Quran, and as such we must reserve and verify the authenticity of the novel and the narrators seizure, and all the conditions laid down by the scholars.

The subject of our research here concerns part of this verification, which is the unknown, the subject of the unknown hadith is considered a matter of great interest by the modernists because it relates to the validity of the novel and the narrators, and the methods of the modernists varied in terms of the reasons for this weakness, the fool never entertained them by the reckless narrative.

I chose the subject of my research the types of Mahjail and

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Gsc Biological And Pharmaceutical Sciences
Revision of public health and clinical importance of amoebiasis in Iraq
...Show More Authors

Amebiasis, related to the pathogenic parasite Entamoeba histolytica, is a prominent cause of diarrhea globally. Amebiasis is primarily a disease of impoverished communities in developing nations, although it has recently arisen as a significant infection among returning tourists and immigrants. Severe cases are linked to a high case fatality rate. Although polymerase chain reaction (PCR)-based diagnosis is becoming more widely available, it is still underutilized. Treatment with nitroimidazoles is now suggested, however novel parasite medication research is a top priority. To avoid problems, amebiasis should be considered before corticosteroid therapy. Because there is no effective vaccination, sanitation and availability to clean w

... Show More
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The Archtecture Of Holy Thresholds And Functionl Indicators For Its Development
...Show More Authors

Obiovisly that the holy thresholds are directly related to Islam and Muslims and related to the general culture of the Islamic peoples. In terms of architecture, it is considered a distinctive architectural scene that reviews the history of this origin and its architectural styles. Recently, with the increase in the number of pilgrims and visitors to the holy shrines, there is a need to develop and expand the buildings and provide them with services and introduce modern technology. The building of the holy thresholds consists of a number of functional design indicators: The general problem of research is that there is no clear theoretical framework for the design indicators for the development of the holy shrines according to the functio

... Show More
View Publication Preview PDF