The research discusses the problem of salaries in the public sector in terms of the process of analyzing its structure and the possibility of benefiting from the information provided by the analysis process for the strategic planning process, and the General Authority for Groundwater has been adopted and one of the formations of the Ministry of Water Resources, which is centrally funded, to represent the salary structure of its employees (1117) employees be a field of research, as the salary structure in it was analyzed for the period between (2014-2019) using the quantitative approach to analysis and by relying on a number of statistical tools in the analysis process, including mathematical circles, upper limits, lower limits, percentage and rate of change, and the research reached a set of conclusions, including knowledge of the behavior of salary movements, the size and distribution of detailed spending and its concentration, giving a clear vision about the nature of the use of the country's financial and human resources as far as the matter is concerned with research, analysis of the strategic dimension resulting from decisions to reduce spending, and the contribution of detailed data and information resulting from the analysis process in developing appropriate policies and strategies. The process of analyzing salaries and according to the approved tables of analysis tables, contributed to the disclosure of the failures in salaries and its structure, whether in the technical side of the structure or the administrative and accounting aspects related to public operational spending and the preparation and distribution of workers, and their impact on the strategy developed and in a manner that leads to the achievement of maximum benefit resources and capabilities and directing them towards optimal use.
The research aims to improve the effectiveness of internal control system according to a model COSO, by identifying the availability of system components according to the model and then improve the effectiveness of each component by focusing on areas for improvement in each component, as it was addressed to a model COSO and then Maamth with the environment, the current Iraqi by introducing some improvements on the form of some mechanisms of corporate governance of the Council of Directors, and senior management, the Audit Committee, Committee appointments, especially that supplies application available in the laws and legislation, the current Iraqi, taking into consideration to make some
... Show MoreMany diseases can produce cardiac overload, of these disease hypertension, valve disease congenital anomaly in addition to many other disease. One of the most common diseases causing left ventricle overload is hypertension. A long term hypertension can cause myocardium hypertrophy leading to changes in the cardiac contractility and reduced efficiency. The investigations were carried out using conventional echocardiography techniques in addition to the tissue Doppler imaging (TDI) from which many noninvasive measurements can be readily obtained. The study has involved the effect of hypertension on the myocardium stiffness index through the measurement of early diastolic filling (E) and the early velocity of lateral mitral annulus (E
... Show MoreEleven species of parasitic insects were recovered from puparia of house fly Musca domestica L. developing in animal dung in Baghdad during 1985-1987. Of the parasites obtained, representatives were found in five families of Hymenoptera and one family of Coleoptera. The most prevalent parasites were Spalangia cameroni Perkins, S. nigroaenea Curtis and S. endius Walk. Average parasitism for the two year was 11.30 %, the highest number of parasitism occurred in May and October.
Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreIn this work an approach has been developed to investigate the influence of surface roughness on thermohydrodynamic performance in aligned and misaligned journal bearings by considering an average flow model and deriving the shear flow factor for various roughness configurations, similar to the pressure flow factor. An average Reynolds equation for rough surfaces is defined in term of pressure and shear flow factors, which can be obtained by numerical flow simulation, though the use of measured or numerically generated rough surfaces. Reynolds, heat conduction and energy equations are solved simultaneously by using a suitable numerical technique (Finite Difference Method) to obtain the pressure and temperature di
... Show MoreThrough an experimental program of eighteen specimens presented in this paper, the bond strength between reinforcing bar and rubberized concrete was produced by adding waste tire rubber instead of natural aggregate. The fine and coarse aggregate was replaced in 0%, 25%, and 50% with the small pieces of a waste tire. Natural aggregate replacement ratio, rebar size, embedded rebar length, the rebar yield stress of rebar, cover, and concrete compressive strength were studied in this investigation. Ultimate bond stress, bond stress-slip response, and failure modes were presented. The experimental results reported that a reduction of 19% in bond strength was noticed in 50% replaced rubberized concrete compared with convention
... Show MoreBackground: intravenous regional anaesthesia (IVRA) is an effective method of producing anaesthesia of the extremities. Disadvantages are the rapid loss of anaesthesia after the deflation of the tourniquet and the rapid development of postoperative pain. It is important to search for agents with longer durations of action, better nerve fibre selectivity, lesser degrees of motor blockade and lower incidences of systemic toxicity.Objectives: This study was designed to evaluate and compare the clinical effects of intravenous regional anaesthesia, with lidocaine alone, or in a combination with ketamine and atracurium for better analgesia, and to examine the possible clinical advantages of using muscle relaxants (i.e., atracurium) with intrav
... Show MoreHypertension is a cardiovascular problem with high rates of epidemiology and risks of morbidity and mortality in the global area. Nitric oxide (NO) is one of the reactive oxygen species (ROS) that produced from L-arginine by nitric oxide synthase (NOS) enzyme. NO involves in various vital processes in human health, one of which is the modulation of vasoconstriction and relaxation of the vascular system. We have aimed to investigate the link between NO and NOS with hypertension in women. The relationship between NO and NOS, as well as the usefulness of them as indicators of hypertension risks were subjects of study in this article. The results have revealed that hypertensive women had significant (P<0.05) lower levels of NO (15.07±3.41 IU/m
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More