After 2003, Iraq witnessed new challenges represented by the predominance of sectarian discourses, hatred and extremism at the expense of moderate political discourse and the predominance of sub-affiliations and external agendas at the expense of national affiliation, which led to the creation of an unsafe or stable environment dominated by the character of violence and terrorism. Moderate discourse would work to fuse sub-affiliations into one melting pot in which it would be the first loyalty to the homeland and not to the tribe, party or sect... Etc., and this in turn will contribute to promoting peaceful coexistence between the various other sub-affiliations within the framework of one community construction
Different Arabic and Islamic societies are free of evil instincts. Therefore, certain provisions of legitimacy came to stress the importance of the intentions of sharia to achieve the interests of all people that involve several aspects, including the five fundamental things: religion, oneself, offspring, mind and money. Almighty Allah has specified certain punishments on those who violate these things by imposing punishments on the part of the criminal to preserve souls. He imposes the penalty of theft to preserve property, the Hadd punishment for adultery to preserve the symptoms, the punishment on the drunk to preserve the mind, and the Hadd punishment for the apostate to preserve the religion. By the adherence to these punishments li
... Show MoreABSTRACT
This research deals with the two item namely, the monetary policy central Bank of Iraqi and money supply . that contribute in up the problem of the paper that is concerned with the fact that to what extent the effectiveness of monetary policy conducted by the central Bank of Iraqi is valid in controlling money supply as well as the possibility of applying it in practical environment restricted to the scope of financial in stitiutions particularly in research population represented by central Bank of Iraqi .
For the purpose of a practical contribution for monetary and financial institutions . To achieve this , A hypothesis has been carried out and it suggested that the mon
... Show MoreBackground: Immediate implant placement in the maxillary anterior region was challenging, especially with the jumping gap and limited primary implant stability. Objective: To assess the autogenous dentin graft biomaterial's ability to improve the esthetic outcomes of an immediately inserted implant. Methods: Twenty patients with non-restorable retained roots in the maxillary non-molar region surrounded by natural sound teeth were included in this study after a complete clinical and radiological examination, including patient health and clinical fitness for the immediate dental implant procedure. A single dental implant was inserted for each patient, and the resulting jump distance was filled with the mineralized dentin graft and co
... Show MoreThe mathematical construction of an ecological model with a prey-predator relationship was done. It presumed that the prey consisted of a stage structure of juveniles and adults. While the adult prey species had the power to fight off the predator, the predator, and juvenile prey worked together to hunt them. Additionally, the effect of the harvest was considered on the prey. All the solution’s properties were discussed. All potential equilibrium points' local stability was tested. The prerequisites for persistence were established. Global stability was investigated using Lyapunov methods. It was found that the system underwent a saddle-node bifurcation near the coexistence equilibrium point while exhibiting a transcritical bifurcation
... Show MoreHorizontal wells have revolutionized hydrocarbon production by enhancing recovery efficiency and reducing environmental impact. This paper presents an enhanced Black Oil Model simulator, written in Visual Basic, for three-dimensional two-phase (oil and water) flow through porous media. Unlike most existing tools, this simulator is customized for horizontal well modeling and calibrated using extensive historical data from the South Rumaila Oilfield, Iraq. The simulator first achieves a strong match with historical pressure data (1954–2004) using vertical wells, with an average deviation of less than 5% from observed pressures, and is then applied to forecast the performance of hypothetical horizontal wells (2008–2011). The result
... Show MoreThe need for an intellectual understanding of the context from many aspects' dictates understanding the ways through which the graphic designer walks in simulating the intent of the design process and elevating it to levels of communicative perception that leads to communicating the idea to the recipient, and it is thus a need closely related to the context, if it is historical. Culturally or socially, and between the mechanisms of selecting and operating the elements and units of the graphic and design achievement. On this basis, the role of context in graphic design can be studied.
The research included four chapters, the first chapter of the research problem and the need for it, and the aim of the research was (discovering the
... Show MoreThe optical absorption data of Hydrogenated Amorphous Silicon was analyzed using a Dunstan model of optical absorption in amorphous semiconductors. This model introduces disorder into the band-band absorption through a linear exponential distribution of local energy gaps, and it accounts for both the Urbach and Tauc regions of the optical absorption edge.Compared to other models of similar bases, such as the O’Leary and Guerra models, it is simpler to understand mathematically and has a physical meaning. The optical absorption data of Jackson et al and Maurer et al were successfully interpreted using Dunstan’s model. Useful physical parameters are extracted especially the band to the band energy gap , which is the energy gap in the a
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More