Recently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visualized and analyzed according to the theory of Complex Networks by representing the stations as nodes and the transmission lines as edges. This analysis is done by applying network metrics to the proposed national IPG network. Finally, this work provides a professional visualization of the generated network based on the demographic distribution and the accurate coordinates of the power stations. Thus, this proposed network is useful for the Iraqi Ministry of Electricity. Besides, it can be adopted by officials and specialists to understand, visualize and evaluate the performance of the current IPG network since it is still under development and modernization.
Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d
... Show MoreAbstract:
The research concerned the study of the railway transport sector in selected countries that sought to raise the efficiency of the railway network and develop it, after realizing the importance of this vital sector, which is a link between it and the rest of the other economic sectors.
The research sought to explain the methods, methods and procedures adopted by these countries for the development of the railway sector, and to benefit from these experiments to improve the efficiency of the railway transport sector in Iraq.
The railway transport sector in Iraq suffers from the erosion of railway lines and mobile units such as locomotives, pas
... Show MoreShifting Sand of English in Iraq language Policy and Planning
Ethanolic crude extracts of leaves from Laurus nobilis and Alhagi maurorumfor were screened for alkaloids, saponins, tannins, anthraquinones, steroids, flavonoids, glycosides, and glucosides contents. Biochemical activities, including antibacterial activity, antioxidant, and antihemolytic activity, were investigated. Antibacterial activity against Three types of pathogenic bacteria was detected by disc diffusion analysis and characterized by zone of inhibition (ZOI). Antioxidant properties were determined by a diphenyl-1- picrylhydrazyl (DPPH) method. Results revealed that the inhibitory activity of the plants against G+ve and G-ve bacteria were different, where the greatest ZOI of Alhagi maurorum a
... Show MoreAbstract
Public debt has posed a major challenge to both developing and developed countries, which has focused attention on the optimal limits (threshold of debt) and its determinants.
The study examines the effect of the Public bank debt on the foreign reserves and the work of the foreign reserve as a limitation on the process of bank debt (part of the internal debt) for the period (2017-2004), in addition to finding the type and nature of the relationship between them according to the hypotheses of the study, Public bank debt and foreign reserves.
The study was based on data from the Iraqi banking sector, which showed that Iraq has a foreign reserve in line with internat
... Show MoreThe present study is concerned with the role of income tax in implementing economic goals in Iraq and treating the problems and pitfalls in the Iraq economy.
The study also aims at investigating the role of income tax in attracting promising favorite effects into economy.
The study was performed on data covering the period (2003 - 2012) with respect to the variables of (income tax, oil profits) as independent variables and (private consuming expenditure, private investmental expenditure, and standard figure of prices) as dependent variables. To analyze these data, a number of statistical descriptive and analytical techniques were used such as (percentage, standard variance, mediums, F test, T test and SPSS). It has been c
... Show Moreالخلاصة
اهتم الفكر السياسي في القرنين الاخيرين بدراسة الطبقات على نحو غير مسبوق, واصبح موضوع التحليل الطبقي المعني بالطبقات من حيث تعريفها, وتحديد موقعها في السلم الاجتماعي, فضلاً عن نوعية العلاقة بين شرائحها وفئاتها المختلفة من حيث الصراع والتناغم, المادة الرئيسة والموضوع الاكثر اهمية في دراسات الفكر السياسي والاجتماعي.ومن بين الطبقات, احتلت الطبقة الوسطى مكا
... Show MoreAbstract
There has been a heated controversy over the role the financial policy plays and how sufficient it is in affording the financial burden. This burden is known as the operational current expenses which the governments of various countries mainly afford, despite the discrepancy in the government’s economic policy. After the deterioration and deficit in the state budget in all countries nowadays, it was necessary to find an appropri
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show Morethe power of the federal supreme court to stop the implementation of the law