KS Ismaeil, BR Jawad, Journal of Physical Education, 2023
......
The Iraqi government seeks to overcome the financial crisis by investing and privatizing some projects to achieve sustainable growth. Most of the investment projects in Iraq suffer from many constraints that greatly impact the success of these projects. A survey of the opinions of a group of experts was conducted to identify the most important constraints facing the investment process in Iraq. Then the experts' answers were arranged in a closed questionnaire and distributed to the research sample for which the statistical analysis was conducted. Through it, the most important (17) factors that had the greatest impact on the failure of investment projects in Iraq were reached. One of the main constraints was
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThe expenditures of the general budget, in its operational and investment divisions, are a basic factor in the economic and social growth of any country, and its impact on various economic activities such as income, employees , and the standard of living of members of society. This was based on a basic premise: Does increasing or decreasing investment expenditures have an effect on increasing or decreasing the tax proceeds, What is the level of relationship between them? and to achieve the goal of the research, an inductive and analytical method was chosen to measure the impact of the investment budget expenditures on the tax outcome quantitatively using the financial data obtained from The General Authority for Taxes, Ministry of Financ
... Show MoreIn this paper, the behavior of spliced steel girders under static loading is investigated. A group of seven steel I-girders were tested experimentally. Two concentrated loads were applied to each specimen at third points and the load was increased incrementally up to the yield of the specimen. Two types of splices were considered; the bearing type and the friction-grip type splices. For comparison, an analytical study was made for the tested girders in which the finite element analysis program (Abaqus) was used for analysis. It was found that the maximum test load for spliced girders with bearing type splices was in the range of (34%) to (67%) of the maximum test load for the reference girder. For girders spliced by using friction-grip t
... Show MoreInternal Audit is one of the most important backers of corporate governance, the researcher expanded his interest in this subject to examine the efficiency of Internal Auditors at the Arab Bank and its branches in Jordan to achieve Accountability which enhances the Corporate Governance and to identify the effect of the International Internal Audit Standards in strengthening the role of Internal Auditors in Accountability, and the effect of Attribute and Performance Standards in Accountability. The researcher applied descriptive analysis method to define the role of Internal Audit in the Arab Bank in achieving one of the basic principles of Corporate Governance assimilated in Accountability. The researcher’s sources include
... Show MoreImam Ibn Abi Shaybah counted in his book classified twenty-five and a hundred recent and impact claimed that Abu Hanifa has violated the provisions required by apparent, and these conversations and effects including with regard to worship and transactions, including with regard to personal status, including with regard to borders and felonies, and collected by Sheikh Muhammad Zahid Al-Kothari in his book funny jokes in talking about the responses of Ibn Abu Shaybah on Abu Hanifa, and these issues we will study in our research.
WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreObjectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.
... Show MoreComplex and complex psychological processes are complexand are the result of convergence, convergence and interaction between variables, including the subject of mediation or group or individual and psychological processes involved in the variance, including - personal knowledge and emotional tone (Osman, 1987, p. 8 ). An emotionally balanced individual has the ability to endure and delay meeting needs and has the ability to endure as much as possible. Of the emotional balance of the individual is characterized by emotional stability, show some signs of emotional agitation toward any kind of opposition, anger and realism in self-life and discipline (Swift, 1996, p. 44) Van, et al. , Indicates that people with low emotional balance,
... Show More