This competition between competing forces, organized into axes with conflicting objectives, is reflected in all regional affairs and the goals and interests of countries within them, including Iraq. Among the most important aspects impacted by the repercussions of international and regional competition in the region is Iraqi national security, based on its vital importance in preserving the sovereignty and entity of the Iraqi state, protecting the interests and cohesion of the state and people, ensuring and defending their present and future, and interacting with various regional and international activities. The Kurdistan Region, as an important part of Iraq with its own unique characteristics, may be one of the most important regions affected by this competition. Keywords: International and regional competition, Middle East, Iraqi national security, Kurdistan Region
The other day in the Holy Quran and the four Gospels
Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
Due to the lack of statistical researches in studying with existing (p) of Exogenous Input variables, and there contributed in time series phenomenon as a cause, yielding (q) of Output variables as a result in time series field, to form conceptual idea similar to the Classical Linear Regression that studies the relationship between dependent variable with explanatory variables. So highlight the importance of providing such research to a full analysis of this kind of phenomena important in consumer price inflation in Iraq. Were taken several variables influence and with a direct connection to the phenomenon and analyzed after treating the problem of outliers existence in the observations by (EM) approach, and expand the sample size (n=36) to
... Show MoreER Abbas, AA Jasim, Journal of Physical Education, 2023 - Cited by 1
It is no secret for those concerned with language concerns that the issue of figurative feminization is one of the issues that does not follow a grammatical rule governed by the fact that the subject of knowledge of this is due to hearing as indicated by linguistic references and lexicons.This research opts to find out the origin of the feminization of the word sun in the Arabic language and in light of what some language specialists have argued that the origin of figurative feminization was due to non-linguistic motives related to religious and metaphysical beliefs, and that it was memory preserved in light of the linguistic heritage.The research concluded that the feminization of the sun goes back to what settled in their minds, which
... Show MoreOccupy public investment spending, a great deal of attention since the thirties of the last century, to play important role in economic and social development process and therefore most of the countries are trying different degree of economic development to the completion of the largest amount of public investment, especially in infrastructure, which is one of the pillars essential to economic development, and in order to maximize utilization of the completion of public investment should focus on achieving efficiency in completion.
The current reality of public projects in Iraq, indicating the absence of several key characteristics that must be provided if these proje
The Mythical Reference in the Poetry of Nabil Yassin
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThis study is concerned with the recent changes that occurred in the last three years (2017-2019) in the marshes region in southern Iraq as a result of the changes in the global climate, the study included all the water bodies in the five governorates that are located in the southern regions of Iraq (Wasit, Maysan, Dhi-Qar, Qadisiyah and Basrah), which represent the marshes lands in Iraq. Scenes of the Landsat 8 satellite are used to create a mosaic to cover the five governorates within a time window with the slightest difference between the date of the scene capture, not to exceed 8 days. The results of calculating the changes in water areas were obtained using the classifier support vector machine, where high accuracy ratios were recorded
... Show MoreThe research aims to learn spatial disparities tracts of agricultural crops in the
province of Maysan and their relationship (the salinity of the soil and the degree of chemical
interaction (PH)) The research is divided into an introduction and three Investigation eat first
section spatial disparities agricultural crops (cereals, vegetables, legumes and forage). The
comparison between the years of production in the province where the province has seen
varied spatial by hand and taking second section degrees of soil salinity and its impact on
agriculture, as well as the chemical reaction (PH) and its impact on agriculture The third
section has been used three technical techniques first linkage and the second simple an