The importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing international and regional powers to preserve their interests and ensure the achievement of their objectives. This has further complicated the internal security environment in the Gulf, especially the recent events represented by a package of measures taken by Saudi Arabia, the UAE and Bahrain. As well as Egypt against Qatar, have begun to reveal to us the depth and root of differences, the size of internal challenges and the weakness of the ability of the GCC countries to meet their obligations in laying the foundations of a joint security-defense system with the capacity to face these challenges collectively, Security challenges are therefore not only external regional or international, but internal with inter-GCC interface
The current research aims to verify the relationship and impact of internal control activities as an independent variable in its dimensions (efficiency, training, independence) in making administrative decisions as a responsive variable and its dimensions (identifying and diagnosing the problem, searching for alternatives, evaluating alternatives, choosing the appropriate alternative, implementing the decision, following up Decision and evaluation) in the Kirkuk Water Directorate, as well as to identify the levels of their practices, and then try to come up with a number of recommendations contribute to the strengthening of internal control activities and the process of making administrative decisions of the researched Directorat
... Show MoreThe purpose of this research is to a treatment the impact of Views outliers to the estimators of a distributed arrival and service to the theory of queues and estimate the distribution parameters depending on the robust estimators, and when he was outliers greatest impact in the process of estimating the both distributions mentioned parameters, it was necessary to use way to test that does these data contain abnormal values or not? it was used the method ( Tukey ) for this purpose and is of the most popular ways to discover the outliers , it shows that there are views abnormal (outliers ) in the estimators of each of the distributional arrival and service, which have a significant impact on the calculation of these estimato
... Show MoreThis study aims at identifying the role played by Public Relations in the field of security awareness of the dangers of terrorism. The research is directed to the employees at the Directorate General of Public Relations and Media at the Ministry of Interior. And that on the basis that those who play an important role in the security awareness are the security institutions, primarily the Ministry of Interior, since this Directorate is responsible for all subjects related to the public security using public relations science. It aims at identifying the functions, methods and communication tools used by the Directorate to raise awareness about the dangers of terrorism. In order to achieve the research objectives, the researcher uses the sur
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreThis work involves the calculation of the cooling load in Iraqi building constructions taking in account the effect of the convective heat transfer inside the buildings. ASHRAE assumptions are compared with the Fisher and Pedersen model of estimation of internal convective heat transfer coefficient when the high rate of ventilation from ceiling inlet configuration is used. Theoretical calculation of cooling load using the Radiant Time Series Method (RTSM) is implemented on the actual tested spaces. Also the theoretical calculated cooling loads are experimentally compared by measuring the cooling load in these tested spaces. The comparison appears that using the modified Fisher and Pedersen model when large ventilation ra
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MoreData scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for
The study was conducted to assess the attitude and awareness of a sample of people regarding the indiscriminate slaughter and its effects on health and the environment compared with slaughtering in a slaughterhouse. The sample consisted of 120 persons from six equal professional groups contacted with the butchery labour (livestock keeper, truck driver, butcher, veterinarian, shopkeeper and consumer). The age ranged 22-76 years old, mean 52±10 years, lived ≥ 5 years in the Baghdad city. The results showed that there is a preference for slaughtering inside the slaughterhouse due to the presence of veterinary examination, slaughtering and preparing meat in a healthy, easy-to-clean places, unlike the indiscriminate sla
... Show MoreIn recent years, non-oil primary balance indicator has been given considerable financial important in rentier state. It highly depends on this indicator to afford a clear and proper picture of public finance situation in term of appropriate and sustainability in these countries, due to it excludes the effect of oil- rental from compound of financial accounts which provide sufficient information to economic policy makers of how economy is able to create potential added value and then changes by eliminating one sided shades of economy. In Iraq, since, 2004, the deficit in value of this indicator has increased, due to almost complete dependence on the revenues of the oil to finance the budget and the obvious decline of the non-oil s
... Show More