The aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.
As an architectural philosophical concept, Islamic architecture cannot be considered arches, doors, domes and lighthouses, since Islamic architecture is based on a structural system of religious, mental, philosophical and logical origins and beliefs shared by the arts, technology and the requirements of the surrounding environment. Rather, the architectural designer's distance from it becomes as if it is for people not from this world, and Islamic architecture is not abbreviated on the heritage side as much as it is a renewed "modern" state, dealing with the concepts of Islam that are valid for every time and place. This can be seen through the mechanisms that produced heritage architecture and what was built on it, which is not a simula
... Show MoreLanguage is fundamental and important for the development of various skills especially in the kindergarten stage where the child begins to approach others and interact with them linguistically listen to them and make sentences to communicate his ideas to them and without the ability to talk and expression, the child's benefit of his experiences in the kindergarten remains limited.
And that children at any stage of early education are subject to different stages of linguistic development, and these stages are a fundamental feature in learning, especially for the skills of speaking, listening and reading, Therefore, the researcher chose the speaking skill the
... Show MoreGeographical, economic, historical, environmental and security factors play a role in strengthening the drive towards union, as well as addressing the need to express regional and federal identity. This is a clear example of this tendency. One legal or one political system with the parts of this united personality retaining their privacy and identity, and there is a delegation to the central entity of the union with some of the common powers while retaining some powers for these parts or states, which means the availability of autonomy for the constituent states of the union and this is the most important characteristic of the federal states or federations It is the autonomy of each state or country participating in the union. Accordingly,
... Show MoreAbstract:
The research aims to clarify the impact of adopting the IFRS16 financial reporting standard on lease contracts in insurance companies on audit procedures. The change in the classification of lease contracts in the case of adopting the IFRS16 financial reporting standard necessarily requires audit procedures that are compatible with this change. A proposed audit program was prepared, guided by international auditing standards, based on the study of the client's environment and analysis of external and internal risks in the light of financial and non-financial indicators. The researchers reached a set of concl
... Show MoreIn this paper, a theoretical study of the energy spectra and the heat capacity of one electron quantum dot with Gaussian Confinement in an external magnetic field are presented. Using the exact diagonalization technique, the Hamiltonian of the Gaussian Quantum Dot (GQD) including the electron spin is solved. All the elements in the energy matrix are found in closed form. The eigenenergies of the electron were displayed as a function of magnetic field, Gaussian confinement potential depth and quantum dot size. Explanations to the behavior of the quantum dot heat capacity curve, as a function of external applied magnetic field and temperature, are presented.
The main objective of this paper is to develop and validate flow injection method, a precise, accurate, simple, economic, low cost and specific turbidimetric method for the quantitative determination of mebeverine hydrochloride (MbH) in pharmaceutical preparations. A homemade NAG Dual & Solo (0-180º) analyser which contains two identical detections units (cell 1 and 2) was applied for turbidity measurements. The developed method was optimized for different chemical and physical parameters such as perception reagent concentrations, aqueous salts solutions, flow rate, the intensity of the sources light, sample volume, mixing coil and purge time. The correlation coefficients (r) of the developed method were 0.9980 and 0.9986 for cell
... Show MoreA ventricular septal defect (VSD) is defined as a communication between the left and right ventricles or between the left ventricle and the right atrium. VSDs are amongst the most common abnormalities of the heart. They can be present in isolation or in association with other congenital cardiac abnormalities. This is study done with the aim to evaluate the types, size, associated CHD with ventricular septal defect in children and adolescent in two cardiac centers (Medical City Complex cardiac clinics, Ibn Al Nafaes teaching hospital) in Baghdad - Iraq
Public-private partnership (PPP) has been used over the past 20-30 years by governments in developed countries to meet the public demand for infrastructural services. In Iraq, the PPP concept is comparatively new to the Government of Iraq (GoI), where the government has historically taken most of the responsibility for providing public services. There are few PPP projects in Iraq. However, the number is increasing. Recently the Iraqi market has experienced a number of attempts of PPP in different sectors, especially after the new investment law in 2006. The aim of this paper is to evaluate the investment environment in Iraq and to indicate the main factors affecting PPP in particular for infrastructure projects. Some literature review and
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More