The current research aims to shed light on the Global Reporting Initiative (GRI), which helps to report financial and non-financial information by economic units in general and listed on the Iraq Stock Exchange in particular. The research was based on a main premise that apply the criteria of the Global Reporting Initiative (GRI) would provide useful information to users to help them make appropriate decisions. To achieve the goal of the research, the descriptive analysis method was used, and quantitative analysis was used. At the level of the descriptive analysis method, a desk survey was conducted. As for the quantitative analysis, it relied on applied data through a questionnaire form (Questioners) as a research tool, and the
... Show MoreAIM: To evaluate the short-term effectiveness of Gamma knife radiosurgery as a modality of treatment of brain arteriovenous malformation. METHODS: Sixty-three patients with arteriovenous brain malformations underwent Gamma knife radiosurgery included in this prospective study between April 2017 and September 2018 with clinical and radiological with MRI follow up was done at three months and six months post-Gamma knife radiosurgery. By the end of the 12th-month post-Gamma knife radiosurgery, the patients were re-evaluated using digital subtraction angiography co-registered with M.R.I. During the 12 months follow up, CT scan or MRI was done at any time if any one of the patients᾽ condition deteriorated or developed signs and s
... Show MoreThe current research aims to answer the following questions: what is the substance of democracy? What is the content of a democratic society? What is the role of university professor in the democratic development of the student university in light of the new Iraqi society? In order to achieve the goals of the research, the researcher developed an a questionnaire based on literature, Iraq's draft constitution in 2005, and his experience of the field of teaching human rights and public freedoms and the teaching of democracy. It was applied to a sample of faculty members in Department of Education and Psychology / College of Education / University Baghdad for the year 20014 were obtained their answers were then processed statistically. Henc
... Show MoreIn this paper, photometric analysis of two short period group of the eclipsing binaries (RS CVn); RT And and BH Vir is presented. New physical and geometric parameters were obtained by performing two computer modeling. The first model is software package PHOEBE based on the Wilson–Devinney method, and the second is Binary Maker 3 (BM3).Our results are in good agreement with those obtained using the same modeling.
The current research aims to identify the nature of the relationship between training human resources in administrative innovation elements In the General Directorate for the education of the third Rusafa one of the formations of the Iraqi Ministry of Education in Baghdad, In order to achieve the objectives of the research, the researcher provided a comprehensive theoretical framework and the preparation and development of a questionnaire as a tool for collecting data based on the prepared measurements and benefit from previous studies, which contains (28) For the purpose of obtaining realistic results for the variables of the research, the researcher used the random sample in the selection of the research sample A total of (63)
... Show MoreGiven a matrix, the Consecutive Ones Submatrix (C1S) problem which aims to find the permutation of columns that maximizes the number of columns having together only one block of consecutive ones in each row is considered here. A heuristic approach will be suggested to solve the problem. Also, the Consecutive Blocks Minimization (CBM) problem which is related to the consecutive ones submatrix will be considered. The new procedure is proposed to improve the column insertion approach. Then real world and random matrices from the set covering problem will be evaluated and computational results will be highlighted.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the