Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and international issues and positions, as well as the collapse of political infrastructure and the emergence of many challenges that threaten Iraqi societal security and civil peace.
In this study, polymeric ultrafiltration (UF) membranes were prepared by phase inversion method to obtain both antibacterial and organic antifouling properties. The membranes were cast from a solution of polyvinylidene fluoride (PVDF) and formative silver (Ag) nanoparticles were successfully immobilized on a polymer. This was done using a solvent N, N-dimethylformamide (DMF) which is a solvent for the PVDF polymer meanwhile it is a reducing agent for silver ion. The effect of silver nanoparticles additives on the performance of polymeric ultrafiltration membrane was verified. Chemical composition and morphology of the surfaces of the membranes were characterized by Fourier transform infrared spectroscopy
... Show MorePreparation and Identification of some new Pyrazolopyrin derivatives and their Polymerizations study
Non-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for
... Show MoreThe expansion in water projects implementations in Turkey and Syria becomes of great concern to the workers in the field of water resources management in Iraq. Such expansion with the absence of bi-lateral agreement between the three riparian countries of Tigris and Euphrates Rivers; Turkey, Syria and Iraq, is expected to lead to a substantially reduction of water inflow to the territories of Iraq. Accordingly, this study consists of two parts: first part is aiming to study the changes of the water inflow to the territory of Iraq, at Turkey and Syria borders, from 1953 to 2009; the results indicated that the annual mean inflow in Tigris River was decreased from 677 m3/sec to 526 m3/sec, after operating Turkey reserv
... Show MoreThis research deals with the frameworks and mechanisms of international press coverage of the issue of foreign interference in the formation of the Iraqi government in the Saudi newspapers Asharq Al-Awsat and Kayhan Al-Arabi Iran and how this topic was addressed in the two newspapers. The frameworks for international press coverage of external interference in the formation of the Iraqi government. ”This research is one of the descriptive research that adopted the survey method، which made it possible to use the content analysis tool to analyze
the content of the two newspapers، whose numbers are (624) from the
newspapers (Al-Sharq Al-Awsat Al-Saudi Arabia and Kayhan Al-Arabi Iran) from (1/1/2018 to 31/12/2018)، and the researc
OBJECTIVE: To assess and compare the knowledge, attitudes and practice regarding obesity management among family and non family physicians working in primary health care centers.
The present study aims at identifying the effect of Renzulli model on achievement and holistic thinking among the fifth grade students in the Holy Quran and Islamic Education. The experimental method with partial control was used, and the sample was chosen randomly. The sample consisted of (62) students distributed into experimental and control groups. 164 behavioral goals were formulated based on Bloom's first three levels taxonomy (knowledge and comprehension, application, analysis and installation, and evaluation). The researchers designed a post-test to measure the achievement of students in the subject of Holy Quran and Islamic Education which consisted of (40) objective items and a measure of holistic thinking which consisted of (3
... Show MoreEnsuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show Morethis study aimed to study the effect of Cordia myxa extract on the growth and activities of the following types of bacteria : Escherichia coli , Pseudomonas aeruginosa, Proteus Spp., Klebsiella pneumoniae , Staphylococcus aureus, Streptococcus pyogenes , Bacillus subtilus, and the yeast Candida albicans .the results showed an inhibitory effect of the methanol extract on both the growth and activity of the tested microbes .this was reflected by the minimum inhibitory concentration ( MIC ) of different type of bacteria and the yeast.
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show More