Preferred Language
Articles
/
jeasiq-783
The phenomenon of Corruption and its impact on the growing problem of Unemployment in Iraq after a year ( 2003 ).
...Show More Authors

        Corruption is a phenomenon that exists in all times and places, they appear in the developing countries and in developed countries, and in all political systems. And its repercussions and economic repercussions on the society in which it is rampant, and lead to the undermining of economic development and obstruction, is also working on increasing poverty and unemployment, as well as its role in the worsening of social problems, and political instability. And corruption is deviant behavior is illegal and contrary to the teachings of the religious and moral values. The emergence of this phenomenon is due to several reasons, including political, economic, social and cultural. Which may be internal or external source and this is what leads to serious effects in the structure of economic and social development of States. The spread of the phenomenon of corruption in developing countries, the main reason for the spread of the phenomenon of underdevelopment, which is reflected in all aspects of life, and lead to a waste of economic and financial resources, and the loss of time and effort, which led to the loss of the opportunity to progress and prosperity in these countries. Because of the serious implications of these reports agreed to international organizations and local bodies to fight the phenomenon of corruption in those countries, including the Iraq. That's where corrupt behavior has spread all Iraqi governmental institutions because of what passed by the economic blockade and long wars and occupation of the U.S., leaving significant effects on the behavior of public servants in particular and on the behavior of members of the community to Nhuaam, which contributed to the low rates of investment, both domestic or foreign, Fady to lower investment projects that can accommodate the economically active workforce, That reflected the worsening of unemployment in Iraq.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Contents of Campaign Advertisements “Take the Vaccine . to Protect Yourself” to Raise Awareness about Vaccines Against صthe Covid-19 Virus (Analytical Study of the Ministry of Health Facebook Page)
...Show More Authors

        This paper aims to identify the contents of the advertisements of the (Take the Vaccine .. to Protect Yourself) campaign that was carried out by the Iraqi Ministry of Health for the period from (11/19/2020) to (4/1/2022), to raise awareness of the anti-Covid 19 virus vaccines, which it published on its official page on Facebook. The researcher used a comprehensive inventory method for the research community, and used the content analysis tool.                                                                             

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Archives Of Razi Institute
Prognostic Value of Intracellular Transcription of Factors HIF-1α and p53 and Their Relation to Estradiol and TNM Parameters of Breast Cancer Tissues in Women with Invasive Ductal Carcinoma in Thi-Qar Province, Iraq
...Show More Authors

Breast cancer is the most common malignancy affecting women's health, with an increasing incidence worldwide. This study aimed to measure the intracellular concentration of the hypoxia-inducible factor 1 α (HIF-1α), tumor suppression protein p53, and estradiol (E2) in tumor tissues of adult females with breast cancer and their relation to tumor grade, tumor size, and lymph node metastases (LNM). The study was conducted on 65 adult female participants with breast mass admitted to the operating theater in Al-Hussein Teaching Hospital and Al-Habboby Teaching Hospital in Nasiriyah, Iraq, from January to November 2021. Fresh breast tumor tissues were collated and homogenized for intracellular biochemical analysis using the enzyme-linked immuno

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
The influence of He-Ne Laser (632.8 nm) on Candida albicans isolated from complete upper dentures: In vitro study
...Show More Authors

The main objective of this study is to determine whether the use of He-Ne Laser (632.8 nm wavelength and power 0.5 mW) is an eligible and effective tool to kill or reduce the cell viability of Candida albicans isolated from complete upper dentures. Twenty one swabs were taken from the complete upper dentures. Only six swabs showed positive cultures for C. albicans. The isolate was divided into two groups, group I was not irradiated (control), and group II was irradiated by He-Ne Laser for different periods (10, 15, 20, and 30) min. After irradiation, the results showed a significant reduction in the viable cell count and colonies diameters especially at exposure periods 10 and 15 min. Although the low power He-Ne Laser was not eradicating t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
International Journal Of Sports, Exercise And Physical Education
The effect of compound exercises (Physical, Physiological) supported by polar m430 devices on developing explosive power in futsal players
...Show More Authors

View Publication
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Identifying the leading sector in the Iraqi economy through the interrelationships between sectors - applied research
...Show More Authors

 

   Analyzing the size of the interrelationships between the main economic sectors in the Iraqi economy is an important necessity to know the impact of each sector on other economic sectors on the basis of the interrelationships and reciprocity between them, and what these relationships have achieved in terms of enhancing development and increasing the gross domestic product. To achieve the objectives of the study, we relied on mathematical (quantitative) analysis using user-product tables. Issued by the Ministry of Planning / Central Bureau of Statistics and Research (Directorate of National Accounts) for the economic sectors that make up the Iraqi economy. The study conc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
Financial policy in the caliphate of Imam Ali (peace be upon him)
...Show More Authors

 

Praise be to God who has guided us, and we would not have been guided had it not been for the guidance of God Almighty. The life of the Commander of the Faithful, Imam Ali bin Abi Talib, peace be upon him, represented the highest meanings of sacrifice, redemption, courage, heroism, patience, altruism, and truth, which were embodied in his unique personality, whose counterpart is rare, if not unparalleled in history. Except for the person of the Holy Prophet Muhammad (may God bless him and his family and grant them peace). In this research, we have presented pictures from the life of Imam Ali bin Abi Talib (peace be upon him), as we have clarified his life, upbringing, conversion to Islam and his ma

... Show More
View Publication Preview PDF