In this work, the spirurid nematode Hartertia gallinarum was reported in the intestine of the spotted sandgrouse, Pterocles senegallus, collected in three different locations: Ga'ara Depression, Iraqi Western Desert, Zurbatiyah and Al-Attariyah, Middle of Iraq. Description and measurements of the nematode were given. The role of termites in the infection of P. senegallus with H. gallinarum was discussed. Occurrence of H. gallinarum in P. senegallus represents a new host record.
Gaining economic policy of exceptional importance in severe unilateral Iraqi economy such as the economy, as oil revenues constitute the center of gravity in the internal and external balances, Economic policy have seen in Iraq beyond 2003 in absentia economic strategic vision and failure in the application of policies to achieve economic development, as there was a disconnect and lack of integration and coordination between macro policies of monetary policy and fiscal policy, especially as if they were floating two policies are not linked by a link
The implementation of decentralization in Iraq was asymmetrical, leading to different forms and paces of implementation. Comparing four cases of Basra, Kirkuk, Nineveh, and Sulaymaniyah indicate that these cases differ in their political stability and autonomy in a way that led to a different forms of decentralization. This paper argues that the higher the level of political autonomy from the federal government, the more efficient the governance model, and the more efficient the governance model, the more legitimate the system (trust), and the more legitimate a system, the more accountable elected officials. Therefore, it recommends reforming the institutional setup of decentralization by having districts, instead of provinces, as t
... Show MoreIt is obvious that the constitutional- political structures which has been emerged in Iraq after the occupation in 2003 frame worked by many sectarian, ethnic, tribal and political orientations, pushing forewords to escalating the contradictions between social- political powers, however, these changes unfortunately result not just destroy and taking apart the political regime and his authority, but the state and his institutions as well, although, did not stamped as wise and rational change for better future to new Iraq and its political, civil and military institutions. Finally, as quick as Iraq start to bisects to sectarian, ethnic and national components according to the new political – social components of Iraq. Indeed, what is req
... Show MoreThe deliberation and exchanged of power is a matter of political importance For the Iraqi political system after 2003, The deliberation of power and its democratic transition and electoral integrity Is a good indicator of political stability and progress In the Iraqi parliamentary political system , The transfer of authority in terms of adopting the deliberative approach represents a structural and institutional dimension of the political process , it led the power to become Authority of the Foundation Exercised in accordance with the Constitution and the law not real power , And lead to the recognition of the existence of an official parliamentary opposition and its right to take political power later through the ballot box Makes the pr
... Show MoreAbstract:
Rabi’a tribe lived on the land of Euphrates since the first century of the
Christ. Then that land becomes her homeland. The Persians tried many times
to drive her away from that land, but with out result.
In the course of time Rabi’a become more knowledgeable of Persia.
This tribe proved her love and sanctification to the land of Euphrates, in the
battle of Dhyqar.
Rabi’a converted to Islam quickly and helped the Muslims to conquer
Iraq with a big number of fighters in many battles like al- Qadisyyah. That
influenced the anger of Mudriat Arab tribes who were their old enemies.
Mudriat tribes did their efforts to reduce the importance of Rabi’a because of
some its branches were among of t
This study aims at re-transmit the spirit of the national democratic project of Iraq post of the chaos left by the Daesh terrorist group stage(The Islamic State of Iraq and Syria, ISIS) , Which controlled large parts of Iraq, and had an adverse effect on the political scene in Iraq, inspired everyone that there are deficiencies in the political, economic, religious and ethnic structure of the Iraqi people in non-response to democratic thought.The researcher relied on the hypothesis that " the requirements of building a democratic project are based on the need to provide the requirements ranging from two interrelated aspects, like the institutional aspect and the aspect that related to the general and necessary requirements for the establ
... Show MoreAbstract
This research aims to develop a unit as part of a sixth-grade Arabic language textbook and measure its effectiveness in the development of twenty-first-century skills of female students. The author adopted the experimental approach with a quasi-experimental design of the pre-post single-group. A list of the major skills was derived from the framework for the 21st-century skills of the mother tongue that was developed by the Partnership for 21st-Century Skills and reviewed and adjusted by some specialists. According to their views, the unit was developed. The study targeted 15 sub-skills falling under three main skills. The results of the study showed the effectiveness of the developed unit in the develo
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More