The social contract represents a set of laws and determinants agreed upon by a group of individuals in order to organize society for the better.This agreement guarantees them to live in peace according to the pre-agreed laws, and on the basis of that, it represents the key to resolving the crisis relations between the state and society, and this is what prompted Iraqi society to move towards the formulation of a new social contract through popular protest movements in 2019.To overcome the old social contract that shook the trust between the state and society as a result of its negative outputs at various political, economic and social levels, and many problems emerged that hindered the process of building the social contra
... Show MoreThe current research aims to identify the effect of the Bransford and Stein model on the achievement of fifth-grade literary students for geography and their reflective thinking. To achieve the objective of the research, the following two null hypotheses were formulated:
- There is no statistically significant difference at the significance level (0.05) between the average scores of the experimental group students who studied geography using the Bransford and Stein model and the average scores of the control group students who studied the same subject in the usual way in the achievement test. 2- There is no statistically significant difference at the significance level (0.05) between the average scores of the experimental gr
Purpose: The research aims to determine the relationship between E-Learning and Total Quality Management (TQM) in Educational institutions in Nineveh Governorates.
Methodology / Design: The researchers distributed (30) questionnaires to employees (teachers and administrators) of Nineveh Governorate education who represent the community of the research sample, as they were analyzed using the SPSS V.20
The importance of research: The importance of the research in the fact that it focuses on one of the educational methods represented in integrating the traditional method and relying on modern technologies using computers and the Internet in the field of education to improve the reali
... Show MoreThis study aimed at an analytical comparison of the Internal Auditing Standards issued by the Institute of Internal Auditors (IIA) and the Guidance Manual for Audit Units issued by the Federal Audit Bureau to show the compatibility and differences between them and the possibility of applying the IIA standards to economic units in Iraq. The guideline was generally not covered by all the internal audit units. There is a lack of keeping pace with changes in internal auditing at the international level and there is a need to strengthen the Guideline on Internal Auditing Standards II A), which is characterized by the preparation of an internal document containing the objectives, powers and responsibilities of the internal audit work as well a
... Show MoreBackground: Oral health and nutrition are in interdependent relationship that good nutritional health enhancing good oral health. Nutrition can affect the development and integrity of oral cavity and the progression of oral disease. The aim of the present study was to assess the prevalence of the gingival health condition in relation to the nutritional status, among 10 years old primary school children in urban and rural area in Al-Hillah city. Material and method: Eight hundred ninety one (891) students, aged10 years old, selected randomly from different primary schools, in urban and rural area in Al-Hillah city, were included in this study. Oral examination including of plaque index assessment, which was done according to the criteria
... Show MoreThis study presents determination of the paleostress magnitudes and orientation of Bekhme Structure in Shaqlawa area northeastern Iraq. Paleostress Analysis of slip-fault measurements is performed using Right dihedral, Lisle diagram and Mohr Circles methods. Depending on Mohr Circles, Bott law and vertical thickness, the magnitudes of the paleostress at the time of the tectonic activity were determined. Firstly, Georient Software was used to estimate the orientation of the paleostresses (σ1, σ2 and σ3). Secondly, using the rupture –friction law, taking into account depth of the overburden and the vertical stress (σv) was calculated to determine the magnitude of the paleostresses (σ1=4500 bars, σ2=1
... Show More
Purpose: Providing practical knowledge of the requirements of a detailed feasibility study for selecting the investment project.
Findings: Directing the private sector towards investing in productive projects - the pre-cast reinforced concrete project - as it achieves a financial return as well as providing Providing foreign currencies by reducing imports and exploiting available natural resources
Practical implications: The importance of a detailed feasibility study to determining whether the project can be implemented or not.
The precast concrete method is one of the best modern c
... Show MoreThe study relied on data about the health sector in Iraq in 2006 in cooperation with the Ministry of Health and the Central Bureau of Statistics and Information Technology in 2007 Included the estimates of the population distribution of the Baghdad province and the country depending on the population distribution for 1997,evaluate the health sector which included health institutions, and health staff, and other health services. The research Aimis; Measurement an amount and size of the growth of health services (increase and decrease) and the compare of verified in Iraq and Baghdad, and evaluate the effectiveness of the distribution of supplies and health services (physical and human) of the size of the population distribution and
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t