The Research aims to determine role of The Intellectual capital in the performance of small and medium enterprises , to achieve this goal through a researcher from the theoretical literature and studies related to the construction of the scheme shows the hypothetical relationship between the variables, which was adopted by the independent variable intellectual capital, distributed four variable are:( human capital, structure capital ,customer capital, innovation capital) as well as four variable (the financial perspective, the customer perspective, process perspective ,the learning & growth perspective) The study were getting to many results as bellow :the intellectual capital in the small and intermediate projects are correlations and effect in the performance of The managements of Iraqi small and intermediate projects have the ability the employment human resources as support for their role in performance whether treated customers but it was not active in employment of human capital money by depending the scope of major measurements and financial reports were showed the small and intermediate projects managements in Iraq the changes that happened have employed the variability that happened and effects with human capital that cause increasing the positive change that depending on events . The most directions were in necessity for the investment projects managements for small and intermediate projects because the good relation of positive changes between human performances and capital were the changes of projects increasing and the support for performance aspects in the necessity to activate and supporting financial axis's
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreIn this research design was treated gap laser mathematically and practically Bashaddam model Raasi simple and new and we have found that there is a good match in the practical and theoretical results
Physicians are infrequently selected to serve in the yearlong role of Jefferson Science Fellow (JSF) as senior science advisor for the US Department of State or the United States Agency for International Development. The authors discuss the role of a JSF in promoting “science diplomacy” from the perspective of one alumnus, who sites examples of ongoing, long-term collaborative projects including one focusing on medical education reform in Iraq that would not have been possible without the JSF program. More than 3 decades of political and social unrest, terrorism, the internal displacement of millions of Iraqi citizens, the arrival of Syrian refugees, international sanctions, and the effect of fluctuating oil prices that fund education i
... Show MoreBACKGROUND: Anemia during pregnancy is still a challenge throughout the world, and it may cause severe health consequences in the maternal and fetal sides. AIM: This study aims to find out the prevalence of maternal anemia and potential adverse outcomes in Iraq. METHODS: In Medical City Tertiary Center in Baghdad, singleton pregnant ladies came for delivery were involved over 6 months’ period. Based on hemoglobin (Hb) readings; they were divided into no anemia group (Hb>11 g/l) and anemia group which were further subdivided into mild, moderate, and severe (Hb =10–10.9, =7.1–9.9, and <7 g/l, respectively). Full history and examination were performed by attending obstetrician and pediatrician for the upcoming b
... Show MoreThe research article deals with the process of building or rebuilding the state in Iraq after 2003 in its various dimensions, in light of the vision and foundational procedures that were developed and supervised by the United States in cooperation with the new leaders of Iraq based on the mechanism of sectarianethnic representation, and diagnosing the imbalances that arose out of that vision and the accompanying procedures, which led to the emergence of new variables in the political process, especially in the post-ISIS* phase, which produced important challenges to the political system and the Iraqi state. The political dynamics and balances emerging after ISIS* represented at the same time opportunities and risks in the process of
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show More