World War II has brought suffering for all people; it has led people to have a nostalgic feeling. The war has many faces all of them are ugly, like death, separation, loneliness, violence, crime, betrayal, and disconnection and many other meanings. Michael Ondaatje in his novel The English Patient (1992) portrays a picture of the effect of World War II on four different characters; Hana a Canadian nurse, The English patient who is Hungarian, Caravaggio a Canadian-Italitan thief, and Kip an Indian sapper. They live together in one house, share their secrets and memories about World War II. Ondaatje brings them together to reveal their secrets and to heal their wounds of the war experience.
The banks mobilize savings and channel them to the economy, whether commercial or Islamic banks and thus both contribute to increasing financial depth, the objective of this paper is to measure the contribution of the Islamic banks in increase financial depth in Iraq, and compared the role played by private commercial banks in contributing to increasing financial depth in Iraq. The paper has been applying the most used indicators of financial depth that used widely in the literatures, especially those applicable with the Iraqi economy.
The paper found via using the Autoregressive Distributed Lag Model (ARDL) that Islamic banks did not contribute to increasing financial depth in Iraq, as well as for the p
... Show MoreThe current research aims to diagnose the type and level of influence of social media, whose dimensions are represented by (attitudes towards social media marketing, knowledge and use of social media, influence on the Internet and social media, following up on social media) on customer behavior in its dimensions (attracting attention, raising Interest, desire creation, customer response), and the research sought to answer questions related to the research problem by testing the main hypotheses to explore correlations and influence between the two variables, and to achieve research hypothesis tests, the field study was used, as the research sample reached (135) individuals from the director and the assistant director And marketing personnel
... Show MoreChromatographic and spectrophotometric methods for the estimation of mebendazole in
pharmaceutical products were developed. The flow injection method was based on the oxidation of
mebendazole by a known excess of sodium hypochlorite at pH=9.5. The excess sodium hypochlorite is then
reacted with chloranilic acid (CAA) to bleach out its color. The absorbance of the excess CAA was recorded
at 530 nm. The method is fast, simple, selective, and sensitive. The chromatographic method was carried out
on a Varian C18 column. The mobile phase was a mixture of acetonitrile (ACN), methanol (MeOH), water
and triethylamine (TEA), (56% ACN, 20% MeOH, 23.5% H2O, 0.5% TEA, v/v), adjusted to pH = 3.0 with
1.0 M hy
A New developed technique to estimate the necessary six elastic constants of homogeneous laminate of special orthotropic properties are presented in this paper for the first time. The new approach utilizes the elasto-static deflection behavior of composite cantilever beam employing the famous theory of Timoshenko. Three extracted strips of the composite plate are tested for measuring the bending deflection at two locations. Each strip is associated to a preferred principal axis and the deflection is measured in two orthogonal planes of the beam domain. A total of five trails of testing is accomplished and the numerical results of the stiffness coefficients are evaluated correctly under the contribution of the macromechanic
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreThis study aims to identify the level of application of blue ocean leadership activities in public organizations and to build a conceptual and cognitive framework around this concept. The study adopted a descriptive-analytical approach, and the research sample consisted of (95) individuals from the senior management working at the center of the Iraqi Ministry of Communications (director general, department manager, section head). The data analysis technique used is structural equation modeling (SEM) and the Statistical Package for the Social Sciences (SPSS). The results indicate that the senior management in the Ministry of Communications is working to adopt the blue ocean leadership style through its activities, but not to the leve
... Show More