This is a descriptive study that used the survey method, it’s aimed to identify the topics and frameworks of diplomatic and political issues covered by the news of the website of the Iraqi Ministry of Foreign Affairs, through the content analysis method applied on a sample selected in a systematic random manner for news published in the year 2021. The sample included (191) news equivalent to (20%) of the total study population of (942). The study reached some results, the most important of which were as follows: The political issue, in its general sense, grabbed the most prominent attention among the various issues and events focused on by Iraqi diplomacy: "international cooperation", "bilateral cooperation", and then "regional political coordination" appeared as the most prominent political issues. Also, The frameworks of “general bilateral relations” and “political diplomatic cooperation” were dominant in the news. The frameworks of “regional cooperation,” economic cooperation,” “international cooperation,” and “security/military cooperation” appeared as frameworks for diplomatic and political activity. This reflects the interests of the Iraqi diplomacy in strengthening Iraq's relations with the various active powers in the world.
In this work, a deep computational study has been conducted to assign several qualities for the graph . Furthermore, determine the amount of the dihedral subgroups in the Held simple group He through utilizing the attributes of gamma.
The research dealt with the concepts of the philosophy of values and its epistemological variables according to specific propositions represented in their scientific approaches to value theory in the field of industrial design. As the epistemological propositions of the theory of values were dealt with based on the epistemological fields that dealt with the concept and what values are, starting with the modernist propositions and postmodern, passing through the propositions of sociological and psychological thought, which was a prelude to extracting the concepts of value theory and adopting it in the field of industrial product design. The epistemological approaches to value theory in industrial product design were repr
... Show MoreThe high bounce activity according to the fosbery way is regarded as of the difficult sports concerning its way of training and perfection due to hard technique of its performance on one hand and because it depends on the player’s ability to overcome body weight resistance against the gravity. In addition to the strong ability to control the body posture when leaving the land and flying over the barrier. This activity needs to high plosion power at the moment of bouncing and this plosion depends on the period of bouncing, so the two researchers aimed to use a mechanical bouncing platform and an electronic one through several training by one foot and both feet in different directions and positions in order to reduce the time of bouncing an
... Show MoreThe problem of the research lies in special motor abilities training programs like the balance that positively affect coordination between the nervous system and muscles. These training programs did not get enough attention from athletes especially young athletes; their training was restricted to physical abilities like strength, speed, and endurance instead. The research aimed at designing an apparatus for developing athletes’ balance in national centers for gifted/ ministry of youth and sport so as to provide a measurement for coached in this field. The results showed that the designed apparatus have a positive effect on developing the subjects’ balance in boxing and basketball athletes.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreA study that collected 240 samples and divided into two groups: the first 120 samples were for diabetics and the second 120 samples were for healthy people, and each group included (90, 20.10) samples from the mouth, urine and vagina respectively, The results showed positive (28.67, 4.00, 1.67) isolates of Candida. In the mouth, urine and vagina, respectively, of diabetic patients compared to (9.33, 2.33, 5.00) positive isolates in the mouth, urine and vagina, respectively, in the healthy. The rate of positive isolates in women was high in women with diabetes and healthy, and it reached 25.33 and 9.00 isolates, respectively, compared with the rate of isolates in men with Candida disease for diabetic patients and healthy people 14.67 and 2.0
... Show MoreThe aim of this study was spot light to the possibility of confection between hepatitis C&G viruses in Iraqi patients. The groups was studied included two groups as follow: 1- first group: its (Infected group) the patients of this group have Anti-HCV abs in their serum by using Indirect ELISA technique. 2- second group: its (Control group) the persons of this group have no Anti-HCV abs in their serum by using indirect ELISA technique. The result of this study was observed there was two patients from the first group have Anti-HGVabs in their serum with infection percent 2.70%, also the same result was found in the second group wich mean there was two persons have Anti-HGVabs in their serum with infection percent 8.33% .So when we comparin
... Show More