As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak of the Russian-Ukrainian war, which affected food supply chains and was important for wheat. The Gaza war caused consequent repercussions on energy crossings and supplies in the Eastern Mediterranean and West Asia. Owing to these factors, there have been repercussions on regional and international hubs and blocs in the Middle East. Additionally, the continued US-Iranian escalation on controversial issues worsened the situation. The US- Iranian influence essentially imposed
In an intensive study of the various species of the Euglenophyceae under different environmental conditions, the algal samples were collected monthly in twelve springs and six related streams from September 2019 to August 2020 within Shaglawa district-Erbil Province in virgin areas for phycolimnological study. Twenty species of Euglenophyceaen are identified as a new record for the algal flora. These taxa consist of Colacium vesiculosum, Lepocinclis salina and L.wangi, Eutreptia viridis, Euglena chlamydophora, E. clavata,
... Show MoreWaste recycling is one of the modern means of treating waste and minimizing its harmful effects that have caused problems for all countries of the world through the disposal of them in a safe and healthy manner as well as achieving economic and social benefits to the United Nations, and through the goals of sustainable development. 2015-2013 seeks to solve the environmental problems, including various peoples of the world, through various projects and programs, including waste recycling. Here is the question of whether there is a relationship between waste recycling and the goals of sustainable development, the research seeks to answer through five categories to determine the type of relationship between waste recycling and the g
... Show MoreAchieving a connection between sustainability processes and environmental protection, or what is known as sustainable development, requires paying more attention to environmental and sustainability issues for various projects and their effects on environmental problems. It involves determining the most appropriate ways to deal with them within pillars of sustainability (environmental, social, economic, and natural resources. As cement is a fundamental component of industrial services and construction in cities, it has a direct and significant interaction with the development process, making it one of the most important industries in Iraq. Because of the clinker particles and combustio
The objective of this research is to analyze the content of science textbook at the elementary level, according to the dimensions of sustainable development for the academic year (2015-2016). To achieve this goal has been to build a list with dimensions of sustainable development to be included in science textbooks in primary school, after seeing the collection of literature and research and studies, as has been reached to the list of the dimensions of the three sustainable development and social, economic and environmental in the initial image consisted of (63) the issue of sub-divided the three-dimensional, the menu and offered a group of arbitrators and specialists in curriculum and teaching methods, and thus the menu consiste
... Show MorePurpose – measure the relationship between operation management strategies as an independent variable on the customer's delight as an approved variable.
Design/methodology/approach – The research sample vocabulary included sales representatives and customers of the researched markets at a rate of (100%). The recovery rate is (95) Customers and (95) delegates for the products for the factory in neighbourhood (Banooks and Karrada ) regions were randomly chosen from an open community in these two residential areas. Statistical methods were used (arithmetic media, standard deviations, t-test, correlation coefficient (Horst), simple regression analysis).
Findings – The people in charge of the factory management nee
... Show MoreAbstract
Objective(s): To evaluate blended learning in nursing education at the Middle Region in Iraq.
Methodology: A descriptive study, using evaluation approach, is conducted to evaluate blended learning in nursing education in Middle Region in Iraq from September 26th, 2021 to March 22nd, 2022. The study is carried out at two Colleges of Nursing at the University of Baghdad and University of Tikrit in Iraq. A convenient, non-probability, sample of (60) undergraduate nursing students is selected. The sample is comprised of (30) student from each college of nursing, Self-report questionnaire is constructed from the literature, for e
... Show MoreThe study aimed to identify the psychological counseling skills and the strength of the ego in the educational counselors, and to identify the relationship of statistical significance between the psychological counseling skills and the strength of the ego in the educational counselors, and to identify the differences of statistical significance in the relationship between psychological counseling skills and the strength of the ego in the guides according to the gender variable(male, Females), the number of sample (100) guides, including (50) males and (50) females from the area of Atifiya and Qadissiya and Ameriya in the Directorate of Education Karkh / 1, the researcher adopted a scale of psychological counseling skills prepared b
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More