The international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.
In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show Moreالدخول للموضوع: الحاجة لمواجهة التعقيد
تتناول هذه الورقة الفكرية فلسفة الادارة الجديدة وتطبيقاتها عبر ما يسمى "الادارة بالقيم" – MBV- (Management by values) التي تستند على الاحتياجات الحالية لبيئة المنظمات. ففي بحث (Dolan & Michley, 2006)، واستناداًَ لخبراتهما وممارساتهما اقترحا نموذج القيم ثلاثي المحاور (Tri- axial values model)، وهي: المادية- الذرائعية
... Show MoreThe research aims to delve into the nature of international financial reporting standards and the unified accounting system adopted in the Iraqi environment and financial ratios in the theoretical side. In the practical aspect, the results of some financial ratios of Basrah Gas Company were compared with the adoption of the financial statements prepared on the basis of the consolidated accounting system with the prepared financial statements Based on the International Financial Reporting Standards (IFRS). The research has reached a number of conclusions, including a difference in the accounting rules and practices between IFRS and the consolidated accounting system in force in Iraq. The adoption of IFRS has led to a decrease in profitabi
... Show MoreDue to the wide distribution through the Iranian Plateau, especially in its western parts adjacent to Iraq’s northeastern borders, the occurrence of Brandt’s Hedgehog
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe bandwidth requirements of the telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user.The passive optical
A total of 247 Mallard ( Anas platyrhynchos platyrhynchos L.) from Baghdad and Kut were examined for the Cestodes Diorchis stefanskii Sobolevicanthes gracilis; Hymenolepis mastigopraditae and the Nematode Amidostomum acutum in the first time in Iraq . Among these , 151 birds were found infected by these helminthes It has been found small nodules on the external surface of the intestine , Ulceration of mucosa inflammatory infiltrate , Oedemats changes and hyperplasia in the section of infected intestine were noticed.