Abstract
The research aims to diagnose the reality of applying the eighth requirement (operation) of the business continuity management system according to the international standard (ISO 22301: 2019), in the General Tax Authority, which is related to planning, implementing and controlling specific processes and procedures to address risks and opportunities, and the research adopted the checklist of the standard ( ISO 22301: 2019), in obtaining information, to measure the extent of application and documentation, the percentages and the weighted arithmetic mean were relied upon, and the research reached a set of result
... Show MorePresents here in the results of comparison between the theoretical equation stated by Huang and Menq and laboratory model tests used to study the bearing capacity of square footing on geogrid-reinforced loose sand by performing model tests. The effects of several parameters were studied in order to study the general behavior of improving the soil by using the geogrid. These parameters include depth of first layer of reinforcement, vertical spacing of reinforcement layers, number of reinforcement layers and types of reinforcement layers The results show that the theoretical equation can be used to estimate the bearing capacity of loose sand.
Iraq suffers from serious pollution with harmful particles that have important direct and indirect effects on human activities and human health. In this research, a system for detecting pollutants in the air was designed and manufactured using infrared laser technology. This system was used to detect the presence of pollutants in the dust storms that swept the city of Baghdad which could have a negative impact on human health and living organisms.
The designed detection system based on the use of infrared laser (IR) with a wavelength of 1064 nm was used for the purposes of detecting pollutants based on the scattering of the laser beam from these pollutants. The system was aligned to obtain the best signal for the scattered rays, w
... Show MoreAbstract
The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism
... Show MoreCOVID-19 is a disease that has abnormal over 170 nations worldwide. The number of infected people (either sick or dead) has been growing at a worrying ratio in virtually all the affected countries. Forecasting procedures can be instructed so helping in scheming well plans and in captivating creative conclusions. These procedures measure the conditions of the previous thus allowing well forecasts around the state to arise in the future. These predictions strength helps to make contradiction of likely pressures and significances. Forecasting procedures production a very main character in elastic precise predictions. In this case study used two models in order to diagnose optimal approach by compared the outputs. This study was introduce
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreAZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012