Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Current
Archives
About
About the Journal
Submissions
Privacy Statement
Search
Register
Login
Home
/
Archives
/
Vol. 20 No. 1 (2013): Vol20
Vol. 20 No. 1 (2013): Vol20
Published:
11/25/2022
Articles
"The Impact Of Change Management On Organization Re- Structure: Strategic – Perspective"
Sawsan Jassim Mohammed
79-91
pdf
Knowledge Administration Between Information Technology and Productive Performance
Abdulrasul A. Jasim
1-8
pdf
The Legal Frame of a Crime of Taking Drugs
H .M. Saleh
65-77
pdf
Activation Of Idle Production Capacities In The Iraqi Economy
r. Hussen A. Hassan
53-64
pdf
The Dangers Of Narcotic Drags And The Way To Combat Them Through Legislations And The Judiciary
R. M. Jasim
9-23
pdf
Islamic banking success factors
S.R. Alshammary
93-108
pdf
Drug are Crimes Gateway
. Abdul Sattar Salim AL-Kubaisi
141-155
pdf
Behavior of Reactive Powder Concrete Deep Beams
Hani M. Fahmi, Ihsan A.S AlShaarbaf, Abdullah Sinan Ahmed
1-22
pdf
Punching Shear Resistance of Reactive Powder Concrete Flat Slabs
Kaiss F. Sarsam, Hassan F. Hassan
23-42
pdf
Iraqi Criminal Policy To Combat The illegal Use of Narcotic Drugs and Psychotropic Substances
A.H. Al Timimi
25-52
pdf
Comparison Between the Effect of Silica Fume and Wood Ash Used for the Production of High Performance Mortar
Eethar Thanon Dawood
43-49
pdf
Effect Of Kerosene And Fuel Oil On Compressive Strength Of Reactive Powder Concrete
Sana Taha Abdul-Hussain
51-71
pdf
High performance lightweight concrete reinforced with glass fibers
Eethar Thanon Dawood, Ali Jihad Hamad
73-87
pdf
Enriching Web Requirements Analysis by Adding Style Factor into UML
Zainab M. Hussain, Mohammed QasimShawkat
89-108
pdf
pdf
Building Safety System Using LASER Sensors
Ali Makki Sagheer, Husain Ali Husain, Firas Mohamed khalaf
109-120
pdf
The Extent Of Iraqi Laws In Response Of The International Agreements’ Requirements To Strive Against Drugs Crime
Thul Fiqar Ali Rassan, Ali Ghani Abbas
109-122
pdf
Distributed Data Security and Privacy in WBAN-Related e-Health Systems
Sufyan T. Faraj, Ali J. Dawood, Abeer D. Salman
121-132
pdf
Entry System in Matrix Form and Computerized System
M.H.Alhafith
123-140
pdf
A Modification on Rivest Cipher (RC4) Algorithm Against FMS Wired Equivalent Privacy (WEP) Attack
Mohammed A. Noaman, May Sabri Mohammed, Dina Harith Shakir
133-144
pdf
Testing the Randomness and Using the Digital Sequences of GF(5) in Cryptography
Ayad Ghazi Naser Al-Shammari
145-160
pdf
Arabic stego_system based on Arabic Language structure and pronunciation
Ismael Abdulsattar, Naji M.Sahib
161-169
pdf
The Strangest Novels in World Literature
Aziz Yousif
201-219
pdf
Trafficking of African people in Alex Haley's Novel Roots
Fawziya Mousa Ghanim
221-231
pdf
Performance Evaluation of Asynchronous SDMA-CDMA for Mobile Cellular System
Qaidar M.Quboa, Abdulsattar M. A, Reem B. Saadallah
171-189
pdf
Efficient DSP Receiver Architecture for Underwater Acoustic Communications
A. E. Abdelkareem
189-199
pdf
Current Issue
Language
العربية
English
Information
For Readers
For Authors
For Librarians