يعد موضوع البرنامج النووي الايراني من الموضوعات التي تحظى بأهمية كبيرة في مجال الدراسات الدولية بشكل عام والدراسات الاستراتيجية بشكل خاص، وذلك لكونه لا يتعلق بمستقبل الجمهورية الاسلامية الايرانية فحسب بل بمستقبل منطقة الشرق الاوسط ولاسيما منطقة الخليج العربي، وهو ذو صله وثيقة بمستقبل انتشار الاسلحة النووية بين دول المنطقة والذي قد يؤدي انتشارها الى حروب اقليمية وقد يوظف فيها هذا النوع من الاسلحة النووية، لاسيما ان حالة عدم الاستقرار في منطقة الشرق الاوسط وسيما الخليج العربي تشكل محفزات قوة لنشر الاسلحة النووية، فضلا عن ما يثيره هذا البرنامج من اشكاليات معقدة ما بين وجهات النظر الايرانية والغربية في أطار كونه مخصصا للأغراض السلمية او العسكرية، كما ان اشكالية البحث تنصب في مدى تأثير البرنامج النووي الايراني على معادلة التوازن الاقليمي في منطقة الشرق الاوسط بصورة عامة ومنطقة الخليج العربي بصورة خاصة في حالة حيازة ايران القدرة النووية مما قد يفضي الى بروز انعكاسات خطرة على انساق العلاقات الاقليمية والدولية ويشكل اخلالا بمعادلة التوازنات الاستراتيجية
In today's cities, it is easy to see large numbers of vacant lands and unused abandoned sites in downtown areas that are not only ugly but also potentially becoming fertile ground for criminal activities that endanger residents and visitors and contribute to the further degradation of neighborhoods,
can provide reuse of spaces Neglected opportunities to reshape the appearance of the city and to improve the city center for its users that the presence of many neglected sites, whether they were abandoned buildings or sites for destroyed buildings in Mosul after the war on ISIS and with large areas amid the urban fabric led to the emergence of the research problem is (lack of urban planning to reactivate abandoned sites within the ci
... Show MoreThe purpose of this research is to study the quality of scientific research at the University of Baghdad in light of scientific piracy and plagiarism of research and results and attribute it to others intentionally or unintentionally. Proactive writing such as stealing ideas or synthesizing the results of one another over others and its negative impact on the quality of scientific outputs and the reputation of educational organizations through an exploratory study in the faculties of the University of Baghdad, scientific and humanitarian. As for the aims of the study, it was determined by determining the negative impact of piracy on scientific research. A Likert five-point scale was used in this research. The research community c
... Show MoreThis research delves into the role of satirical television programs in shaping the image of Iraqi politicians. The research problem is summarized in the main question: How does satire featured in television programs influence the portrayal of Iraqi politicians? This research adopts a descriptive approach and employs a survey methodology. The primary data collection tool is a questionnaire, complemented by observation and measurement techniques. The study draws upon the framework of cultural cultivation theory as a guiding theoretical foundation. A total of 430 questionnaires were disseminated among respondents who regularly watch satirical programs, selected through a multi-stage random sampling procedure.
Th
مشكلة البحث
وتعد مرحلة المراهقة من اصعب المراحل التي يمر بها الفرد واخطرها اذ يطلق عليها بمرحلة التفكير المجرد ، وهي مرحلة حاسمة في حياته اذ تتكون لديه معالم الشخصية .أنهم خزين الامة الحقيقي من الطاقات الحيوية التي لا تنضب لذا يجب الاهتمام بهذه الشريحة من المجتمع وتطويرهم وتوجيههم لاسلم الطرق للحفاظ على مستقبلهم ومستقبل الا
... Show MoreThe aim of this research is to demonstrate the impact of credit risk on the banks of the study sample on the granting of loans and credit facilities, and try to reduce the size of credit risk to banks as a result of granting loans and credit facilities, credit risk is the oldest form of risk in financial markets. Every financial institution takes a degree of risk when it gives loans and credit facilities to companies and customers, It is exposed to financial losses when some borrowers fail to repay their loans as agreed, and at the same time credit facilities are the most profitable operations of the bank as it is the most profitable banking operations than other operations, so it represents the research communit
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
In the Name of God, the Most Gracious, the Most Merciful
Praise be to God, who taught the pen anthropology unless he knows, and peace and blessings be upon the master of bullying, and the imam of the eloquent Prophet Muhammad, the sincere and faithful, and his family and companions as a whole and whoever followed him to the Day of Judgment. And after:
The science of grammar is among the most important of all language sciences at all, if not the most important of its sciences, due to the multiplicity of its doctrines and schools, the diversity of its methods, its phenomena and subjects, as well as the connection of this science with the most honorable languages,
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show More