Objective :.
1-Find out the prevalence of alcohol and drugs addiction in two different years before and after the last
war i.e. in 2002 and in 200. 2-Study the association between the addiction
and some variables. 3-Identify the prescribed drugs and other substances that
have been abused
Methodology : A retrospective study has been conducted involving the in-patients at addiction unit-IbnRushd
psychiatric hospital in Baghdad by applying the semi-structured form based on ICD-10 criteria
of addiction and dependency with the confirmation of the specialist psychiatrist diagnosis of
dependency. Data concerning each patient admitted in the hospital was gathered to have an idea about
the problem of addiction (drugs an
Iraqi EFL students face difficulties in writing composition, especially academic writing, which affects negatively their exam results. This study has been conducted in the Department of English at College of Education for Women, University of Baghdad, in order to identify first year EFL students’ incompetence in writing. This may enhance their achievement by some weekly writing activities. It deals with Iraqi EFL students’ difficulties in writing paragraphs such as descriptive, process, opinion, and factual paragraphs. The study aims to identify these difficulties and to suggest suitable solutions for them. The researcher perceives that it is necessary to enhance students’ skills in writing because it i
... Show MoreObjective: To measure the serum levels of Fetuin-A, ischemia-modified albumin (IMA), and ferritin in hospitalized patients with severe COVID-19in Baghdad, Iraq. Moreover, to determine these biomarkers' cut-off valuesthat differentiate between severely ill patients and control subjects. Methods: This case-control study was done from 15 September to the end of December 2021 and involved a review of the files and collectionof blood samples from patients (n=45, group1) hospitalized in COVID-19 treatment centersbecause of severe symptoms compared tohealthy subjects as controls (n=44, group2). Results: Fetuin-A serum levels were not statistically different between patients and controls. In contrast, IMA and ferritin levels were significan
... Show MoreColorectal cancer is a malignant condition that can arise from multiple causative factors. It ranks second, behind lung cancer, as a leading cause of cancer-related deaths worldwide. Extensive research has been conducted to unravel the genetic underpinnings and molecular mechanisms underlying the development of colorectal cancer (CRC). However, epigenetic modifications of histones at the DNA level have become significantly involved in several malignant diseases such as CRC. Hence, this research sought to assess, for the first time locally, the immunoexpression of HDAC-1 and 3 in a group of colorectal patients. Additionally, we explored potential correlations between the expression of HDAC-1, 3 and VEGF. This retrospective study enco
... Show MoreResearch aims to shed light on the concept of corporate failures , display and analysis the most distinctive models used to predicting corporate failure; with suggesting a model to reveal the probabilities of corporate failures which including internal and external financial and non-financial indicators, A tested is made for the research objectivity and its indicators weight and by a number of academics professionals experts, in addition to financial analysts and have concluded a set of conclusions , the most distinctive of them that failure is not considered a sudden phenomena for the company and its stakeholders , it is an Event passes through numerous stages; each have their symptoms that lead eve
... Show MoreThe process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show MoreAt the heart of every robust economy is a vital banking system. The functional banking system can effectively perform several functions such as mobilizing savings, allocating credit, monitoring managers, transforming risks, and facilitating the financial transactions. This paper aims to measure the impact of banking system development on economic growth in Iraq. Credit to private sector divided by GDP used as a proxy of banking development. Real per capita GDP used as a proxy of economic growth. By using Autoregressive Distributed Lag (ARDL) model, the paper finds that the undeveloped Iraqi banking system could not promote economic growth in the country. Therefore, a variety of policies need to be taken to spur the role of bankin
... Show MoreThe research is based on the basic idea that companies today are moving towards a new trend towards protecting the environment coupled with the increasing wareness of the pollution damage caused by these companies due to their operations and activities in the environment. The two main reasons that led the researchers to choose this subject is the need to adapt the companies themselves in response to successive developments, The great development was that companies moved from the sole economic responsibility of the business to social responsibility by emphasizing socially responsible profit. The problem of research is the knowledge of the availability of the dimensions of the green processing series in Kirkuk Cement Factory The re
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More