Preferred Language
Articles
/
abaa-454
IRAQ BETWEEN A CULTURE OF CIVIL SOCIETY AND A CULTURE OF VIOLENCE
...Show More Authors

The title takes its realistic connotations with its symbols, slogans and historical extensions in Iraq, also, the repercussions of the organic crisis that afflicted it for almost half a century, especially after the abortion of the July 14 Revolution and the spread of the culture of weapons, violence and death that we are living in Iraq nowadays.

The topic is suitable for critical analytical studies carried out by specialists in scientific and academic research centers and cultural institutions because they have an important feasibility at the strategic cultural level in Iraq, the Middle East and the world.

Research in Iraq has fallen to the extreme and is no longer effective, to the extent that it represents a severe crisis as it lacks freedom and suitable scientific conditions. 

We try in the following pages to discuss this subject from its political, social and sectarian content, as well as, taking advantage of the Iraqi author references, books "memos" and historical testimonies of some leaders, either because they have begun to feel the responsibility, or because some of them were free to publish his manuscript views after his death!

The topic is suitable for critical analytical studies carried out by specialists in scientific and academic research centers and cultural institutions because they have an important feasibility at the strategic cultural level in Iraq and the Middle East and the world.

In any case, it remains a positive point of light in self-criticism and experience in rebuilding man and society on new foundations, away from those black claws that have been ravaging Iraq and Iraqis and messing with slogans over time.

The researcher in the political topic in Iraq opposes the circumstances of the emergence of the Iraqi state and the establishment of the military "national" formations, which became a permanent base in the conflicts and the acquisition of Iraq which has been used to resolve disputes between military leaders, suppression of movements of protest, insurgency, popular uprisings, the emergence of "coup", blocs  and personal relations. Perhaps “Sectarianism” may have had an influential role in containing and controlling the military by involving the country in political conflicts and take control over by the mean of these "national" leaders. The cultural environment of these national officers was limited in their professional positions through the military culture they had acquired in their senior ranks in the Iraqi army, as well as, in the Ottoman Empire or through their social affiliation to feudal and tribal families, which had a

special privileges for Britain as one of the first and most important pillars of the occupation and the monarchy in Iraq from its inception until its overthrow in the national revolution of July 1958.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Relationship between Third Trimester Vaginal Bleeding Medical Causes and pregnancy Outcomes of Pregnant Women Attending Bint Al-Huda Hospital in Al-Nasiriya City
...Show More Authors

Objective: To find out the relationship between vaginal bleeding during third trimester and pregnancy outcomes. Methodology: A purposive sample is "Non-probability" of (100) women who had diagnostic vaginal bleeding during third trimester (27-40wk) of pregnancy, and who visited the Bint Al-Huda Hospital for the period from 15th Feb. to 17th May 2015.Validity and reliability of questionnaire are determined through pilot study. Descriptive and inferential statistical procedures were used to analyze the data, and the data were collected by using interview technique, constructed questionnaire has been desig

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Design and Evaluation of a Polarizer Filter
...Show More Authors

This research includes theoretical and evaluation design of a polarizer filter of high transmission in the near IR region of (900-1200nm) for different incidence angles to obtain a long wave and short wave pass filter using analytical calculations. Results refer to a new configuration design in fewer layers than used in previous studies in the long wave pass at incidence angles (45o,50o,55o). Adopted Hafnium dioxide (HfO2) and Magnesium fluoride (MgF2) as coating material at design wavelength (933nm), the study also included design short wave pass polarizer by using the same coating material.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Sep 12 2012
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the

... Show More
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 08 2022
Journal Name
Al-khwarizmi Engineering Journal
Design and Analysis of a Spraying Robot
...Show More Authors

An indoor spraying robot is built in this research to solve numerous challenges associated with manual spraying. The mechanical, hardware and essential technologies used are all detailed and designed. The proposed spraying robot's conceptual design is split into two parts: hardware and software. The mechanical design, manufacturing, electrical, and electronics systems are described in the hardware part, while the control of the robot is described in the software section. This robot's kinematic and dynamic models were developed using three links that move in the x, y, and z directions. The robot was then designed using SolidWorks software to compute each connection's deflection and maximum stresses. The characteristics of the stepper moto

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 18 2014
Journal Name
Geological Quarterly
Stable carbon and nitrogen isotopes and elemental composition and origin of organic matter from the Euphrates, Injana and Dibdibba formations in Iraq: discrimination between marine and terrestrial environments
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
The optical text in the cinema film Between the presence and absence Play for free mark: حسام الدين محمد عبد المنعم
...Show More Authors

The light-based life in the universe, including the human derived concepts and meanings of the fear of darkness and evil, comfort and goodness of light, became constitute bilateral haunted man to this day in various concepts of life.Therefore reflect the light form artistic aesthetic in visual arts such arts Fine Photography and the other until the emergence of art cinema, as the use of lighting in cinema has produced high-energy in the composition of its values expressive and symbolic, where it became dark and light are the space visually moving the vehicles media kit for many within the work structure artwork. The research is divided into five chapters, the first chapter (the methodological framework) that included an introduction the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 02 2020
Journal Name
Journal Of Applied Research In Higher Education
Proposal of a guide for talent evaluation and management based on a qualitative and three-staged approach
...Show More Authors
Purpose

The key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.

Design/methodology/approach

The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty-three individuals from six Australian universities parti

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Requirements of Formulating a National Strategy for Developing the Cybersecurity System in Iraq According to GCI.v4(2019) Index
...Show More Authors

The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire

... Show More
Preview PDF
Scopus (3)
Scopus