Necessary and sufficient conditions for the operator equation I AXAX n*, to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.
The study was conducted from November 2021 to May 2022 at the three study sites within the Baghdad governorate. The study aims to identify the impact of human activities on the Tigris River, so an area free of human activities was chosen and represented the first site. A total of 48 types were diagnosed, 6204 ind/m3 spread over three sites. The following environmental indicators were evaluated: Constancy Index (S), Relative abundance index (Ra), Richness Index (between 17.995 and 23.251), Shannon Weiner Index (0.48-1.25 bit/ind.), Uniformity Index (0.124 -0.323). The study showed that the highest percentage recorded was for the phylum Annileda 34%; and the stability index shows that taxes (Stylaria sp., Aoelosoma sp., Branchinra sowerby, Ch
... Show MoreAfter word war ll, the United States of America pursued a policy of containment aimed at preventing the Soviet Union from penetrating into the countries of the world, especially the regions of the Middle East, Therefore, it worked to emphasize the establishment of relations that include various political, economic and even cultural aspects, and focused its policy in his aspect on Turkey due to its geopolitical position. At a time when Turkey was undergoing developments at various levels and a change in govemment policy after the Demccratic Party came to power, which focused in its foreign policy on strengthening reltions with the West in general and the United States America in particular. The US government was the supporter of Democrat
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreBac kground:: Septal deviation is one of the commonest anatomical deformities of the nasal skeleton, this deviation is usually accompanied by compensatory hypertrophy of the inferior turbinate on the concave side that will accentuate the severity of nasal obstruction.
Objectives: To evaluate the effect of septoplasty on the size of the inferior turbinate in patients with nasal septum deviation.
Methods: This is a prospective study of 25 patients attending the otolaryngological department at Al-Jirahat teaching hospital from September 2011 to November 2013, complaining mainly of nasal obstruction. Otolaryngological examination had shown nasal septum deviation. The cross sectional areas of inferior turbinates were measured with compu
The research aims at recognition of The rate of performing tasks done by the scientific committees in the scientific departments in the University of Baghdad, within the evaluative perspective of the departments’ Heads. To find any statistically significant differences in the responses of the research sample to the rates performance of the scientific committees in scientific departments in the University of Baghdad, within the evaluative perspective of the departments’ Heads, according to the two variables of the social gender; male and females, and field of specialization of Scientific and Humanities. The research sample consisted if (107) heads of the scientific department in the University of Baghdad. The researchers designed a
... Show MoreWe studied, in this paper, the semiotics of the visual image of women in the discourse of empowerment, through three models of advertising images expressing the particularities of the Saudi Arabian environment.
We aim to know how the mark operates and how it is interpreted, as a semantic process in which the meaning ranges from description to interpretation, and we studied two hypotheses:
-The advertising image is a structure in which the mark corresponds to the reality and the discourse to the context.
-The significance is not found in the visual sign or in the textual sign of the advertising image, but in the creative event that opens up to the social, cultural, and psychological context, and creates a field of dia
... Show MoreAbstract:
The aim of this research to try to determine the type of expected relationship between inflation as the explanatory variable and market performance as a dependent variable, for that used data issued and published by the Central Bank of Iraq and the Iraqi Stock Exchange for a sample consisting of (159) observations using the intentional or intentional sampling method for the period extending between the months (January 2010 to March 2023), in the light of each of the Consumer Price Index (CPI), the Iraqi Stock Exchange Index, the number of traded shares and the number of market capital shares to ex
... Show MoreThe transfer of training process occupies a great importance in achieving the ultimate goal of participating in the training programs , it is sure that this does not take place without the support of the working environment for trainees, and The research aims to personification role the work environment characteristics of supporting the transfer of training.
The research problem is the weakness transfer of training to the work en
... Show More