The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the state issuing it does not take precedence over the interest of society as it is prevalent in traditional punitive laws (and the Iraqi law among them). In addition to the importance of expanding the legal diagnosis of images of indirect prejudice to social security that takes the form of media, economic and political activity, whether its source is internal or external. And presenting an integrated vision of state security that goes beyond the traditional formula in distinguishing between internal and external state security and considers the holistic character of the concept of state security in the modern era.
The huge magnetic fields of neutron star cause the nuclei of the stellar surface to form a tightly bound condensed layer. In this research some characteristics of polar gap and magnetosphere enclosed the star according to Sturrock Model were illustrated, positrons move out along the open field lines, and electrons flow to the stellar surface as in the related to Sturrock model. The magnetic field within polar gap areas, which is defined by the Irvin Radius (RL) decreases due to the expansion of the polar, resulting from the physical motion of the accreted material. The values of height gap at different distances from the star were estimated. The obtained results improve the most energetic positrons those with E? Emax radiate away their ener
... Show MoreThis paper discuses the mindset contribution of the organization Science in organizational effectiveness (OE), and the most valuable thoughts they introduced in this subject, starting from the pre- classical era, through classical era to present time. This paper has identified the main contribution in OE. The concept of OE didn’t arise until what had been introduced by Chester Barnard, although Max Weber mentioned this concept in his bureaucratic theory, but he didn’t explain it as Barnard does. After that no clear focus was pointed to this subject until Peter Drucker did so, which considered as the main participant in OE after Barnard. After that many researchers be interested in OE and they start studying this subject like
... Show Moreبناء على ما تقدم يتضح ان القطاع العام والقطاع الخاص ليسا موقفا ايدولوجيا انتقائيا، وانما هو انبثاق من العمود الفقري للصيرورة الرأسمالية القائمة على تقديس الملكية الخاصة، وان الادوار التي يمكن ان يلعباها ليسا منعزلين عن الحركة العامة للاقتصاد في كليته، وليس هما ابنا السياسات الاقتصادية، والبناء الفوقي بقدر ماهما نتاج الحركة الموضوعية وصيرورة التطور الاجتماعي معبرا عنها في تطور علاقات الانتاج وقوى الانتا
... Show MoreAttitude is an important subject that has attracted researchers and thinkers in organizational theory and organizational behavior because of its great importance in various field studies. Field evidence suggests that individuals in their daily lives or careers respond to specific events through a set of internal tendencies Internal tendencies are negative or positive and systematic. These trends tend to be invisible, not limited to certain boundaries, and involve a significant number of individuals within organizations or society.
The research aims to identify the impact of trends in the ethics of public service workers for individuals, through a sample of (72) doctors and (60) administrative staff
... Show MoreThe goal of this research to identify the effect of the probing questions in the collection of material literature with students of the Kurdish language department, to achieve the aim of the research, the researcher has chosen a sample from the students of third stage of the Kurdish language Department, Faculty of Education / Ibn Rushd as a field for the application of experiment.The number of sample reached (71) students divided into two groups represented two divisions of the experimental groups under study to the style of questions sounding by (35) students, and represented the other division of the control group, which studied in the way normal and by (36) students, as rewarded r
... Show MoreRecent studies agree that the democratic system in a country can only be established in an atmosphere of political and religious freedom. However, the term democracy and the term freedom have become controversial because their concepts remain multiple and different. Karl Popper is one of the most prominent philosophers in modern Western political thought, and one of the defenders of democracy as opposite to dictatorship. It has defined its function by its ability to restrain the ruling elite and to enforce it to prevent their tendency to tyranny. This can be achieved only in the context of the close relationship between democracy and freedom, so, if there is democracy in the absence of absolute freedom, democracy is a gateway to expandin
... Show MoreThree-dimensional (3D) reconstruction from images is a most beneficial method of object regeneration by using a photo-realistic way that can be used in many fields. For industrial fields, it can be used to visualize the cracks within alloys or walls. In medical fields, it has been used as 3D scanner to reconstruct some human organs such as internal nose for plastic surgery or to reconstruct ear canal for fabricating a hearing aid device, and others. These applications need high accuracy details and measurement that represent the main issue which should be taken in consideration, also the other issues are cost, movability, and ease of use which should be taken into consideration. This work has presented an approach for design and construc
... Show MoreThis experiment was carried out in the College of Agricultural Engineering Sciences, Univ. of Baghdad, during autumn 2021 growing season to investigate possibility study of increase lettuce antioxidant and biological yield, growing and producing lettuce hydroponically under film technique (NFT) using a globally approved standard solution (Cooper solution), Nested design with three replications adopted in the experiment, each of them included in main plot the first factor, which is LED light (B and R), Then levels of second factor were randomly distributed within each replicate, which included spraying with organic nutrients which was Cymbopogon citratus and Hibiscus sabdariffa at two
This is a brief research in which I tried to briefly explain the care that the Holy Qur’an received during the era of the Prophet, may God bless him and grant him peace, from the Prophet, may God bless him and grant him peace, and all of his honorable companions, may God bless him and grant him peace. I made this research in an introduction and two chapters, the first chapter I made it entitled: About the Holy Qur’an, in which I talked about general investigations about the Holy Qur’an, such as the definition of the Holy Qur’an and the difference between it and the hadith Qudsi and the hadith of the Prophet, then I mentioned a part of the virtues of the Holy Qur’an in general and the virtues of some surahs in particular, and th
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show More