The research aims to apply the activities of the green value chain as one of the modern administrative techniques that economic units resort to develop solutions to the pollution problems that occur due to the activity of economic units and their products that may cause damage to the environment as well as the waste of natural resources and to identify the production of environmentally friendly products and reduce the costs of environmental failure of both types Internal and external that may be borne by economic units such as taxes, fines and compensation due to non- observance of environmental requirements and the preservation of human health and protection of the environment.To achieve the goal of the research, the researchers re
... Show MoreMagic is an attempt to affect people or events either by cheating and charlatanry means or by expecting devil powers in order to bring advantage or to avoid a harm or to bring harm to others or to for see the future and divition .
Magic is either real by the devil like writing majic works to prevent the marriage of someone and to depart the husband and his wife , causing someone to be distressed the physical and nervous diseases and stopping the stories and the project; majic can be artificial by being intellect and legerdemain and different types of triks and to cancel the magic by using magic or by protecting the self by using Talismans as well as presenting or offering sacrificers to the masters and th
... Show MoreResearch on sustainable design in Iraqi craft industries and ways to develop them is essential to preserving the cultural heritage and authenticity of these industries while promoting environmentally sustainable practices. Lack of access to modern technologies, knowledge and resources may hinder the growth of these industries and their ability to compete in the global market. The research problem revolves around finding ways to develop sustainable design in the Iraqi craft industries. The expected outcomes of this research include a clear definition of sustainable design, understanding the history of sustainable design in the craft industry, identifying different types of craft industries in Iraq, exploring the basic concepts of sustaina
... Show MoreThere are many harmful acts that occur from drunkards in this case, especially those resulting from car accidents. The world is witnessing dozens or even hundreds of car accidents due to alcohol consumption. These accidents often result in serious injuries that could lead to the death of the drunk driver and those in the car As well as other persons present in the other vehicles with which the incident occurred or pedestrians on the street, as well as damage to private or public property, and if the order of return of the affected persons on the pretext of civil liability (tort) is made as a direct cause of the harmful act, Is entitled Do they like this refer to the liquor seller or their provider as the culprit? Or are they not related to
... Show MoreThis article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreObjectives: to assess nurses' knowledge toward infection control measures for hepatitis a virus in hemodialysis
units and to detemine the relationship between nurses' knowledge and their demographical characteristics.
%eihs:::°mg:rA5th:e;:#tt£:eoscTodbyerw9¥,C22;5];e.d°utathem°dialysisunitsofBaghdadTeachingHospha|sstated
A non-probability `tturposive" sample of (51) nurses, who were working in hemodialysis units were selected
from Baghdad teaching hosphals. The data were collected through the use of constructed questionnaire, which
consists of two parts (I) Demographic data fom that consists of 10 items and (2) Nurses' knowledge form that
consists of 6 sections contain 79 items, by means of direct interview techniq
Incorporating the LiDAR sensor in the most recent Apple devices represents a substantial development in 3D mapping technology. Meanwhile, Apple's Lidar is still a new sensor. Therefore, this article reviews the potential uses of the Apple Lidar sensor in various fields, including engineering and construction, focusing on indoor and outdoor as-built 3D mapping and cultural heritage conservation. The affordable cost and shorter observation times compared to traditional surveying and other remote sensing techniques make the Apple Lidar an attractive choice among scholars and professionals. This article highlights the need for continued research on the Apple LiDAR sensor technology while discussing its specifications and limitations. A
... Show MoreSignature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various
... Show MoreThe lower Cretaceous sandstones of Zubair and Nahr Umr formations are the main producing reservoirs in Subba oilfield in southern Iraq. Key differences in their petrophysical and depositional attributes exist affecting their reservoir characteristics. The evaluation of well logs and core porosity-permeability data show better reservoir properties in Nahr Formation. The Litho-saturation logs indicate greater thickness of oil-saturated reservoir units for Nahr Unr Formation associated with lower values of shale volume, and higher values of effective porosity. In addition, higher values of permeability for Nahr Umr Formation is suggested by applying porosity-irreducible water saturation cross plot. The reducing reservoir quality of Zub
... Show More