يعد موضوع الثورات العربية من الموضوعات التي تحظى بأهمية كبيرة على المستويين الاقليمي والدولي، لذا فقد طورت مؤسسات الابحاث الدولية ومراكز صنع القرار السياسي والاستراتيجي الاطر والمفاهيم الجديدة في مجال السياسة الدولية، نظرا للتطورات التي شهدتها المنطقة العربية والتي استدعت التطرق الى مجموعة من المفاهيم النظرية ذات العلاقة الوثيقة بما هو حاصل في المنطقة العربية من تغييرات مما تطلب الامر البحث والتدقيق ومناقشة هذه المفاهيم والمقاربات النظرية، وذلك من خلال المتابعة الدقيقة لحالة الدول العربية التي حدثت فيها الثورات العربية التي توضح لنا بان الثورات العربية في هذه الدول استهدفت بالدرجة الاساس انهيار نظم سياسية قائمة واعادة بناء نظم اخرى، وهذا ما تؤكده الشعارات التي تبلورت تحت عنوان( الشعب يريد اسقاط النظام)، لذلك فأن فكرة البحث الاساس سوف تركز على دراسة مدى فاعلية وتأثير الثورات العربية على طبيعة الانظمة الحاكمة في المنطقة العربية وانعكاساتها المستقبلية في اعادة صياغة خارطة توازنات جديدة تسهم في ترتيب محصلة علاقات تفاعلية جديدة وبرز ادوار لفاعلين جدد ضمن اطار معادلة الترتيبات الاقليمية والدولية في المنطقة العربية مما يعزز الاطروحات والخيارات الاستراتيجية المرتكزة الى حقيقة اساسية الا وهي كيفية التعامل مع هذه الثورات العربية في المستقبل المنظور.
RNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce
... Show MoreThe purpose of this research is to study the quality of scientific research at the University of Baghdad in light of scientific piracy and plagiarism of research and results and attribute it to others intentionally or unintentionally. Proactive writing such as stealing ideas or synthesizing the results of one another over others and its negative impact on the quality of scientific outputs and the reputation of educational organizations through an exploratory study in the faculties of the University of Baghdad, scientific and humanitarian. As for the aims of the study, it was determined by determining the negative impact of piracy on scientific research. A Likert five-point scale was used in this research. The research community c
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreA novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul
... Show MoreThe research aims to study the effect of an increase in funding the Equity by issuing new common shares on revenues ordinary shares, despite the issuance and marketing costs and the introduction of new shareholders that companies incur when issuing new common shares but it is the most important methods used to finance the Equity is funding the common shares it provides money sufficient to finance the large investments of the company and enhance the confidence of dealers with the company, so I designed this research in order to identify the impact of increased funding Equity issue new common shares to common shares revenues.
This research has included some of the theoretical concepts to each of the Equity
... Show MoreAbstract
The model of financial reporting in Iraq Based on a specific set of accounting objectives & concepts, which require the application of the historical cost valuation approach due to the nature of the objectives of financial reporting in Iraq, established under the unified accounting system , which focuses on serving the needs of the state because it the most influential user in setting accounting objectives and concepts, which stems mainly from the nature of the economic system in Iraq, which focuses on the public sector versus the private sector as well as the nature of the ownership business that focuses on partnership versus corpor
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.