The objective of the investigation was to analyze the structure and administration of the political system in Iraq (post-ISIS). After 2003, the Iraqi political system suffered the fundamental problem of its failure to achieve the political and social inclusion that characterizes democratic systems, to guarantee the establishment of a "state for all", while respecting differences. Political representation has moved from the system of sectarian ethnic components, under the title of consensual democracy, to the representation of leaders and the realization of their interests and the interests of their parties at the expense of the groups that claim to represent them, which complicates the problem. In this sense, the new political system could not represent social pluralism, on the one hand, and could not satisfy the demands of the same components on the other. Methodologically, it is a political investigation in the framework of the analysis of the political system. It was concluded that the search for new balances is a pending issue. While these emerging balances and arrangements are still fragile and immature to the extent required, they represent a clear entry point to reshape the regime's political structure in one form or another.
Engineering equipment is essential part in the construction project and usually manufactured with long lead times, large costs and special engineering requirements. Construction manager targets that equipment to be delivered in the site need date with the right quantity, appropriate cost and required quality, and this entails an efficient supplier can satisfy these targets. Selection of engineering equipment supplier is a crucial managerial process .it requires evaluation of multiple suppliers according to multiple criteria. This process is usually performed manually and based on just limited evaluation criteria, so better alternatives may be neglected. Three stages of survey comprised number of public a
... Show MoreFine aggregates used for concrete works in Sulaymaniyah city frequently fail to meet the standard requirements for gradation and fineness modulus in cement concrete. This paper aims to critically evaluate gradation, fineness modulus, and clay contents of various natural sands produced and used for concrete work in the region. Sixteen field sand samples were collected from various sites in Darbandikhan (5 samples), Qalat Dizah (5 samples), Koysinjaq (5 samples), and Piramagroon (1 sample) confirming to ASTM D75. The field samples were parted into test specimens based on ASTM C702. Then, sieve analysis was carried out on the oven-dry test specimens in compliance with ASTM C136. The test results of fine aggregates wer
... Show MoreStable isotope composition of δ2H and δ18O was investigated in the water resources of the Shwan sub-Basin northeast of Iraq. The study objects conceived the possible factors that affect the stable isotopes’ composition in precipitation additionally to achieve information concerning recharge processes and estimate the groundwater recharge sources. In this study, four precipitation samples were collected at the study area for the 2020–2021 hydrological year. Thirty-two groundwater samples and one surface water sample from Lesser Zab River (LZR) were collected during the same period for two sampling seasons. The results of observed meteorological data show a very small amount of pr
Objectives: To highlight the knowledge of Al-Kindy medical students regarding varicella infection and to assess their knowledge and attitude toward its prevention. Methodology: This descriptive cross-sectional study enrolled academic year 2020/2021 students at Al-Kindy College of Medicine from first to final year. We used an online questionnaire by Google forms to collect data, which were analyzed with SPSS 26. Results: A total of 208 students participated with 126 in the preclinical and 82 in the clinical grades. Generally, most clinical students were more aware about epidemiology, clinical manifestations, and complications of varicella infection than the preclinical students. Conclusion: Educational stage is a significant variab
... Show MoreThis study was designed for isolation and molecular identification of Nontuberculous Mycobacterium (NTM) from fish during the period between October and December 2017 from Karbla province, Iraq. This study included 200 fresh fish samples from four different species including Spondyliosoma cantharus, Liza abu, Carassius carassius and Cyprinuscarpio. Three samples of each fish were taken including gills, muscles and all internal organs. The samples were processed by decontamination, concentration of 4% sodium hydroxide, and 0.1 ml of sediment was streaking on Löwenstein Johnson (LJ) media; then the bacterial cultures were incubated at 28-30 °C for 3days up to 4 weeks and suspected colonies were stained with acid fast stain to confir
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More