The current study is descriptive; it focuses on studying the contemporary geopolitical problem, and sectarian differences in Caucasus. Nagorno-Karabakh is considered an important disputed region nowadays. Many parties and states participated in this dispute, especially after the conflict had developed into an open war between Armenia and Azerbaijan. Thus, the study aims to examine the causes of the conflict in this region, analyze the international positions on this conflict, and find if Armenia was able to occupy this region. The methodology adopted by the researchers is the functional approach, and the theory of power analysis that Cohen created for analyzing all strengths that drove each of the parties to compete with one another other over the vital area. Among the most important findings of the research are: the multiplicity of causes of conflict in this region; one of which is the passage of one of the most important energy pipelines, Baku-Tbilisi-Ceyhan line, and the different positions and roles of the actors in this conflict, where some of which support the state of Azerbaijan, and others support the state of Armenia according to what serves their interests. Armenia was able to occupy Karabakh region, and other areas surrounding it that constitute a fifth of the area of Azerbaijan through the war between them since 1989. The study concluded that the conflict is sectarian, ethnic and historical. Armenia considers Karabakh a starting point to achieve the ambition of the united states of Armenia.
This research aims to study and evaluate the reality of the Iraqi banks in terms of how they cope with the risks of the banking business, specifically banking operational risks, and to develop a model integrated to define, identify, measure and mitigate the impact of these risks on according to the Basel Committee requirements II about the dangers of Alchgal.uchir major search to the presence of weak results in the Iraqi banks in understanding and defining and measuring operational risks and not hedged properly, which avoids those banks operating losses as well as the results show there is a shortage in the equation of capital adequacy applied by the Iraqi banks because of non-observance of the minimum capital required to counter the ris
... Show MoreThis research paper looks to put its hands on sufi symbols which are applied by the algerian poet د abdallah hammadi د in his poetical works . the symbols it relies on are : ( symbolisme of wine . symbolisme of light . symbolisme of night . sufisme and nature , femal symbols ) .
From these symbols we try to show its range of ability to apply it , with trying to determine its meaningful , dimensions .
In the rapidly evolving telecommunications industry, accurate valuation of tangible assets remains a critical challenge that requires adherence to universally recognized standards. This study addresses the pressing need for transparent and precise asset valuation methodologies that are pivotal for informed investment decisions and financial reporting. It aims to bridge the theoretical and practical divide in asset valuation by applying International Valuation Standards (IVS) 300 and 400 to Asiacell Communications PJSC, a leading entity in the sector. Focusing on five key tangible assets from 2018 to 2022 – lands, buildings, plant and equipment, means of transport and transfer, and furniture and office equipment – the study emplo
... Show MoreThe present study was undertaken to study the effect of apigenin and luteolin on physiological and histological changes in rats treated with cytarabine drugs. Thirty-five albino healthy male adult rats with equal age weighing 250 -300g were enrolled. Rats were randomly divided into seven groups according to the treatment. Group “1” was treated with normal saline and served as the control group. Groups “2,3 and 4” received cytarabine, apigenin, and luteolin respectively, while groups 5, 6, and 7 received a combination of “apigenin + cytarabine”, “luteolin + cytarabine”, and “apigenin + luteolin + cytarabine”, respectively. After one week of treatment, all seven groups of rats were
... Show MoreAbstract:
The current research included " Diagnosis of the reality of the gap for the requirements of Business Continuity Management System According to International Standard (ISO 22301: 2012) in Midland Refineries Company (Daura Refinery) " , for development of an administrative system for Business Continuity is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others . the international legitimacy (represented by the international organization for standardization (ISO)) remains the basis for matching and commitment , and the importance of the application of Business Continuity Management Syst
... Show MoreThe rapid reality of events in the information era, and the enormous pressure of forces market, competition, permanent movement of the markets and consumers and the large development unprecedented of technology in all areas make a lot of organizations find it difficult to keep up with this rapid developments .Here was the role of strategic vigilance closer organization to their environment ,and play an active role in providing the necessary information to make decisions and insurance companies are not far from those changes .On this basis the researcher offered studied(Over the awareness of managers of insurance companies for strategic vigilance).Choosing sample of 35 managers in the National Insurance Company to test th
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreIn this research, a selection of some mineral water was selected on the basis of being the most marketed by the owners of shops in Najaf province, with six types, where daily samples of this water were taken by 50 ml for two months from (1/11/2018 -1/1/2019). The following ions concentrations were measured (Br-, Cl-, F-, NO3-, SO42-, Na+, K+, Ca2+, Mg2+), pH and the electrical conductivity were measured and the results were compared with the allowable rates according to the international organizations. It was noted that they conform to international and Iraqi standards.
In this research, we attempt to show the extent of harmony in an aspect of the text according to the stylistics for the Knowing of the stylistic value of the title threshold, and the pathways of titles that suggest and support the meaning when the recipient reads the literary text, in addition to the interpretations that reflect the purposes of the poet who contributed to the drawing of his poetic achievement. The research presented a brief about the poet and his most important works, because they are the text which will be studied according to the stylistics. The research also explained the concept of style and the stylistics in the preface , because of the stylistic is the method adopted by the research to study the title thresholds in
... Show More