The current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, namely: employee satisfaction, organizational commitment, work-life balance, employee compensation and benefits, and finally, professional development opportunities. These administrative aspects can contribute significantly to reducing employee turnover rates Iraq’s Information and Communication Technology (ICT) sector.
This competition between competing forces, organized into axes with conflicting objectives, is reflected in all regional affairs and the goals and interests of countries within them, including Iraq. Among the most important aspects impacted by the repercussions of international and regional competition in the region is Iraqi national security, based on its vital importance in preserving the sovereignty and entity of the Iraqi state, protecting the interests and cohesion of the state and people, ensuring and defending their present and future, and interacting with various regional and international activities. The Kurdistan Region, as an important part of Iraq with its own unique characteristics, may be one of the most important regi
... Show MoreIn individuals with type 2 diabetes mellitus (T2DM), the cannabinoid receptor 1 (CNR1) gene polymorphism has been linked to diabetic nephropathy (DN). Different renal disorders, including DN, have been found to alter cannabinoid (CB) receptor expression and activation. This cross-sectional study aimed to investigate the relationship between CNR1 rs1776966256 and rs1243008337 genetic variants and the risk of developing DN in Iraqi patients with T2DM. The study included 100 patients with T2DM, divided into two groups: 50 with DN and 50 without DN. Genotyping of CNR1 rs1776966256 and rs1243008337 polymorphisms was conducted using PCR in DN patients and control samples. The distribution of rs1776966256 and rs1243008337 genotypes and alleles bet
... Show MoreThe research aim at identifying the time of motor response to auditory and visual stimuli as well as identifying the accuracy of blocking and finding the relationship between motor repose time and blocking accuracy. The community was (7) primer soccer league of 2019 – 2020 and the subjects were (24) volleyball players from Al Jaish and Al Shorta clubs ten players from Al Shorta club performed the pilot study. The researchers used the descriptive method and the data was collected and treated using SPSS. The results showed a significant relationship between response time and blocking accuracy. The researchers recommended concentrating on applying scientific principles for developing time of motor response in a manner suitable for bl
... Show MoreBackground: Chronic periodontitis (CP) is greatly prevalent condition of inflammatory behavior. Salivary biomarker total antioxidants capacity (T-AOC) status, may be related to both periodontal condition and oral hygiene. Aims of the study: To assess the level of salivary T-AOC of patients with chronic periodontitis in comparison to healthy control and to correlate between the level of this marker with the clinical periodontal parameters (plaque index (PLI), gingival index (GI), bleeding on probing (BOP), probing pocket depth (PPD), and clinical attachment level (CAL)). Materials and Methods: Ninety subjects of males and females with an age ranged between (35-55) years were participated in this study. Participants were divided into two grou
... Show MoreKE Sharquie, AA Noaimi, E Abdulqader, WK Al-Janabi, J Dermatol Venereol, 2020 - Cited by 6
The goal of this study is to investigate the relationship between the student and the teacher and the student's behavior for a subject of the student in the intermediate stage, the sample contained (568) student, (266) male and (302) female.
The scale of student – teacher relationship was built according to a questionnaire pointed to a sample of the students, adding to that reviewing a number of previous scales and studies which was about the same topic, and in the same way a measure of student behavior was constructed.
Results showed that there was significant relation between the student's teacher relationship and student behavior, and the level of student- teacher relationship is higher than the average of the population that
The aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThis research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show More