Preferred Language
Articles
/
jeasiq-2084
identifying the reasons of electronic smoking spreading (VAPING) in the society with practical application using Analytical Factors
...Show More Authors

We have investigated in this research, the contents of the electronic cigarette (Viber) and the emergence of the phenomenon of electronic smoking (vibing) were discussed, although the topic of smoking is one of the oldest topics on which many articles and research have been conducted, electronic smoking has not been studied according to statistical scientific research, we tried in this research to identify the concept of electronic smoking to sample the studied data and to deal with it in a scientific way. This research included conducting a statistical analysis using the factor analysis of a sample taken randomly from some colleges in Bab Al-medium in Baghdad with a size of (70) views where  (КМО) and a (bartlett) tests have been used to test  Data matching and sample sufficiency. Analytical operations were performed using the statistical application (SBSS), where (13) variables were studied. After the analysis, four basic factors were obtained. The phenomenon was explained by the values ​​of different variations. and the Cumulative variance for the factors equal (65.219) and this good output for this phenomenon and  the variance for every one of them equals the first (29.176) and the second (14.551) and  The third (11.174) and the fourth (10.318) and this variance for after rotation matrix

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The influence of the personal values of the workers in the performance of the work teams
...Show More Authors

The research aims to know the impact of workers values on their performance which is reflected on increasing productivity and improving its quality as well as the organization's progress and success.  Application of this research took place in the General Company Of Electrical Industries; it contained four main pillars; the first involved research methodology، regarding the problem، importance، aim، basic theory، and method of data collection، the second is dedicated to the theoretical framework related to the research basic variables (values and workgroups) the third is assigned to analyze the actual data by using number of statistical methods، such as mathematical medium and standard deviation and also spearman rank

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
An Analytical Study for Urban Gentrification on Local Urban Centers
...Show More Authors

The urban Gentrification  is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Influence of Irradiation on Electronic Transition of (CuO) Films Prepared by Chemical Spray Paralysis Technique
...Show More Authors

  In this  research,  We  study the effect  of  irradiation  by  gamma rays from (Cs137) source  for the period time (21) days on optical propertices such as absorption coeffeicient ()and  energy gap (Eg) for  copper oxides thin films (CuO) prepared by the chemical spray pyrolysis and deposited on glass substrates at (350oC) for two different thicknesses  (  1000Ã…and 3000Ã…) .

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
International Journal Of Engineering In Computer Science
Human biometric identification: Application and evaluation
...Show More Authors

View Publication
Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Using Waks Strategy Upon Acquisition The Psychological Concepts And Mind Habits for Students of College of Education
...Show More Authors

  The aim of research is to identify the effect of using Waks strategy upon acquiring the psychological concepts and mind habits for students in the college of education. An experimental design with a partial adjustment of two experimental and control groups as well as a posttest were employed. The researcher divided the study sample into two groups: group one consisted of (38) students to represent the experimental group that was taught according to the waks strategy, and group two consisted of (35) students to represent the control group that was taught according to the traditional method. The sample was chosen based on some variables namely (Intelligence, Prior knowledge). The researcher has designed the research tools as th

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
Using the foreign trade elasticities in policy of demand of imports of agricultural products in Iraq
...Show More Authors

Preview PDF
Scopus
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
The prohibition of cheating in the Sunnah of the Prophet
...Show More Authors

In The Name of Allah Most Gracious Most Merciful

Cheating is one of the forbidden actions and reprehensible morals that are forbidden by Islamic law, because it involves an assault on rights, whether they are the rights of God Almighty or the rights of God.

people, or self-rights, and because it involves harming others.

Since the Sunnah of the Prophet is the second source of Islamic law, many of the noble hadiths of the Prophet forbid and prohibit cheating.

This study sheds light on it.

View Publication Preview PDF