Objective the research is to identify Over the Commitment of a Rushed Bank in Baghdad has applied social responsibility in accordance with ISO 26000 by measuring and diagnosing the gap between the actual reality in the bank and the requirements of the standard.
The tax system, like any other system, as a set of elements and parts that complement each other and are interrelated and interact to achieve specific goals, and is a natural reflection of the economic, social and political conditions prevailing in society, and therefore the objectives of tax policy formulated in line with the objectives of economic policy in general, which means that any change in economic policy clearly affects fiscal policy measures and fiscal policy in particular.
The problem of searching for the impact of foreign direct investment in the Iraqi tax system was focused on the study the of foreign direct investment and therole played in developing and improving the economic reality and its implicatio
... Show MoreSocial isolation and quarantine have been implemented globally during outbreaks of a highly transmissible microbe. For instance, they were employed during the plague outbreak in 1894 and the COVID-19 pandemic in 2019. While these methods have proven effective against highly transmissible infections, they have also had significant negative consequences. In specific regions like Anbar, Diyala, Salahaddin, and Kirkuk, social isolation occurred during the period of ISIS occupation. After their liberation, these regions experienced a COVID-19 outbreak, and quarantine measures were put in place. This study aimed to investigate the effect of social isolation and quarantine on tuberculosis. Patients from Anbar, Diyala, Salahaddin, and Kirkuk distri
... Show MoreThis paper deals the prediction of the process of random spatial data of two properties, the first is called Primary variables and the second is called secondary variables , the method that were used in the prediction process for this type of data is technique Co-kriging , the method is usually used when the number of primary variables meant to predict for one of its elements is measured in a particular location a few (because of the cost or difficulty of obtaining them) compare with secondary variable which is the number of elements are available and highly correlated with primary variables, as was the&nbs
... Show MoreSince 1990 internal combustion engines and variable systems has been considered as emission. Noise can be defined as undesirable sound, and in high levels it can be considered ahealth hazard. Large internal combustion engines produce high levels of noise. In many countries there are laws restricting the noise levels in large engine rooms and fixed applications. Locomotives engines have the minimum emission influence because of noise control techniques capability.
In this paper study on a single cylinder internal combustion engine was conducted. The engine works by adding ethanol to gasoline, at variable speeds, without adding ethanol, and with adding 10 and 20% ethanol in volumetric ratio. Using one sound insulator or two or with
... Show MorePurpose This study was design to investigate of Purpose This study was design to investigate of P. aeruginosa, an example of Gram-negative bacteria, in seven primary and secondary schools of Baghdad city, and the effects of Ethanol and Dettol of P. aeruginosa biofilm. Design/methodology/approach Seventy swabs were collected from seven primary and secondary schools of Baghdad city, Iraq, during November -December 2022. Swabs were collected from classes desk, doors handles, students hands and water taps. Standard microbiological testing methods were used on the samples for isolation and identification. The ability of bacteria to form biofilm and the effects of Ethanol and Dettol on “preformed” biofilms was examined by microtiter plate wi
... Show MoreAs performers in a social world, we communicate with other people by sharing information on many different levels. Each utterance includes linguistic information and conveys much information about the speaker’s identity. Variation in voice quality indexes information about the speaker and marks the speaker’s identity as a unique individual. The present study aims to validate the belief that each individual has an inalienable voice print that can’t be imitated. The study verifies that, even the more similar personality between two individuals, or the close position in society the variance is voice quality. The acoustic analysis is performed via analysing the acoustic parameters namely: the fundamental frequency, amplitude, inten
... Show MoreEducation is the most powerful and important weapon in fighting poverty and unemployment because it provides students with new skills that appropriate the new market requirements and fair distribution of natural resources. It also transfers knowledge, skills, and ethics over generations. Education aims to create effective leaders who go under training and rehabilitation process, create a new human and instill faith, generate the creativity and innovation, and keep abreast with scientific process, updating curriculum, and finally, applying the technical education
The significance of the research lies in the fact that electronic technologies represent an important step in evaluating legal situations, and the research problem centered on the lack of attention to visual requirements and the absence of a clear image of legal situations that may be difficult for the referee to apply correctly in addition to the lack of focus on visual requirements and the unclear depiction of some legal cases which make it difficult for the referee to interpret them correctly This is because the referee's main tool is visual perception, which interprets live situations such as violations, fouls, and other cases that arise during a game Moreover, there are numerous responses and challenges in evaluating legal situ
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show More