ﺔﻴﻋﺍﺫﻹﺍ ﺕﺎﻴﻨﻘﺘﻟﺍ ﻡﺍﺪﺨﺘﺳﺍ ﰲ ﲑﺒﻛ ﺭﻮﻄﺗ ﻦﻣ ﻝﺎﺼﺗﻻﺍ ﺮﺼﻋ ﻩﺪﻬﺷ ﻱﺬﻟﺍ ﺖﻗﻮﻟﺍ ﰲ ﺔﻴﻧﻮﻳﺰﻔﻠﺘﻟﺍﻭ ﺍ ﺢﺴﻓ ﰲ ﻢﻬﺳﺃ ﺕﺎﻄﶈﺍ ﺀﺍﻮﺳ ﺔﻴﻧﻮﻳﺰﻔﻠﺘﻟﺍ ﺕﺍﻮﻨﻘﻟﺍ ﺚﺒﻟ ﻊﺳﺍﻮﻟﺍ ﻝﺎ ( ﺔﻴﺿﺭﻷﺍ ﺔﻴﻠﺑﺎﻜﻟﺍ ﻭﺃ ﺔﻴﺋﺎﻀﻔﻟﺍ ﻭﺃ ( ﱵﻟﺍ ﺔﺻﺎﳋﺍ ﺔﻴﺋﺎﻀﻔﻟﺍ ﺕﺍﻮﻨﻘﻟﺍ ﻦﻣ ﺪﻳﺪﻌﻟﺍ ﺭﻮﻬﻇ ﰲ ﺎﻀﻳﺃ ﺪﻋﺎﺳ ﺎﳑﻭ ، ﺕﺎﻴﺋﺎﻀﻔﻟﺍ ﺭﻮﻬﻇ ﻚﻟﺫ ﻞﺒﻗ ﺩﺎﺳ ﻥﺃ ﺪﻌﺑ ﺔﻴﻣﻮﻜﺣ ﲑﻏ ﺕﺎﻴﻌﲨ ﻭﺃ ﺕﺎﻤﻈﻨﻣ ﻭﺃ ﺩﺍﺮﻓﺃ ﺎﻬﻜﻠﺘﳝ ﻟ ﺔﺠﻴﺘﻧﻭ ،ﺔﻟﻭﺪﻟﺍ ﺎﻬﻜﻠﺘﲤ ﱵﻟﺍ ﻪﺗﺪﻬﺷ ﻱﺬﻟﺍ ﻲﻣﻼﻋﻹﺍ ﺡﺎﺘﻔﻧﻻﺍ ﱪﻋ ﻕﺍﺮﻌﻟﺍ ﺎ ﺮﻣ ﱵﻟﺍ ﻑﻭﺮﻈﻠ ﺹﺎﺧ ﻞﻜﺸﺑ ﺔﻴﺋﺎﻀﻔﻟﺍ ﺕﺍﻮﻨﻘﻟﺍﻭ ،ﺔﻣﺎﻋ ﺓﺭﻮﺼﺑ ﻡﻼﻋﻹﺍ ﻞﺋﺎﺳﻭ ﻊﻴﲨ ) ﺔﻴﻗﺍﺮﻌﻟﺍ– ﺔﻴﻗﺮﺸﻟﺍ – ﺔﻳﺮﻣﻮﺴﻟﺍ– ﺭﺎﻳﺪﻟﺍ – ﺀﺎﺤﻴﻔﻟﺍ –ﺕﺍﺮﻔﻟﺍ – ﺭﺍﻮﻧﻷﺍ-(.. ﺪﻗ ﺕﺎﻴﺋﺎﻀﻔﻟﺍ ﻩﺬﻫ ﺭﻮﻬﻇ ﻥﺇ ﻭ ، ﺎﳘ ﲔﻤﻬﻣ ﻦﻳﺭﻮﳏ ﺭﺎﺛﺃ . . : ١-ﻴﻛﺄﺘﺑ ﻖﻠﻌﺘﻳ ﻡﻼﻋﻹﺍ ﻝﺎﳎ ﰲ ﺭﺎﻤﺜﺘﺳﻻﺍﻭ ﻊﻤﺘﺍ ﰲ ﺹﺎﳋﺍ ﻉﺎﻄﻘﻟﺍ ﺭﻭﺩ ﺪ . ٢-ﺕﺍﻮﻨﻘﻟﺍ ﻚﻠﺗ ﻦﻋ ﺭﺩﺎﺻ ﻮﻫ ﻲﻣﻼﻋﺇ ﺏﺎﻄﺧ ﺔﺣﺎﺗﺇ ﻯﺪﻣﻭ ﺔﺣﻮﻨﻤﳌﺍ ﺔﻳﺮﳊﺍ ﻢﺠﺣ . ﺎﻴﻣﻼﻋﺇ ﺎﻄﳕ ﺖﲰﺭ ﺪﻗ ﻕﺍﺮﻌﻟﺍ ﰲ ﺕﺎﻴﺋﺎﻀﻔﻟﺍ ﻩﺬﻫ ﺭﻮﻬﻇ ﻥﺇ ،ﻕﺎﻴﺴﻟﺍ ﺍﺬﻫ ﰲﻭ ﻥﻻﺃ ﺪﻌﺑ ﻦﻜﻳ ﱂ ﻡﻼﻋﻹﺍ ﻥﺇ ﻮﻫﻭ ،ﺎﻘﺑﺎﺳ ﻕﺍﺮﻌﻟﺍ ﻩﺪﻬﺸﻳ ﱂ ﺎﺻﺎﺧ ﻭﺃ ﺎﻬﺟﻮﻣ ﻭﺃ ﺎﻴﲰﺭ ﺎﻣﻼﻋﺇ ﲑﻴﻐﺘﻟﺍ ﺪﻌﺑ ﻢﻬﺘﺒﻟﺎﻄﻣ ﻞﺑ ﺕﺍﻮﻨﻘﻟﺍ ﻚﻠﺗ ﺏﺎﺤﺻﺃ ﻡﺎﻤﺘﻫﺍ ،ﻚﻟﺫ ﺐﻧﺎﺟ ﱃﺇ ،ﺔﻟﻭﺪﻠﻟ ﺎﻛﻮﻠﳑ ﺙﺍﺪﺣﺃ ﺪﻌﺑ ﺪﻠﺒﻟﺍ ﻩﺪﻬﺷ ﻱﺬﻟﺍ ﻲﺳﺎﻴﺴﻟﺍ ٩ / ٤ / ٢٠٠٣ ﺏﺎﻄﳋﺍ ﰲ ﺔﻳﺮﺣ ﻚﻟﺎﻨﻫ ﻥﻮﻜﺗ ﻥﺄﺑ، ﺪﻴﻛﺄﺗﻭ ﺔﻴﻟﻭﺪﻟﺍ ﻥﺎﺴﻧﻹﺍ ﻕﻮﻘﺣ ﺉﺩﺎﺒﻣ ﻦﻣ ﺎﻗﻼﻄﻧﺍ ﺔﻴﻣﻮﻜﳊﺍ ﲑﻏ ﺕﺎﻋﺎﻄﻘﻟﺍ ﱪﻋ ﻲﻣﻼﻋﻹﺍ ﺔﺻﺎﺧ ﺔﻴﻧﻮﻳﺰﻔﻠﺗ ﺕﺍﻮﻨﻗ ﺀﺎﺸﻧﺈﺑ ﺕﻼﻴﻬﺴﺘﻟﺍﻭ ﺹﺮﻔﻟﺍ ﻊﻴﲨ ﺔﺣﺎﺗﺇ ﱪﻋ ﲑﺒﻌﺘﻟﺍﻭ ﻱﺃﺮﻟﺍ ﺔﻳﺮﺣ ﺔﻴﲰﺮﻟﺍ ﺕﺎﺣﻭﺮﻄﻟﺍ ﻦﻋ ﻒﻠﺘﲣ ﺕﺎﺣﻭﺮﻃﻭ ﺮﻈﻧ ﺕﺎﻬﺟﻭ ﻞﻤﲢ .
Estimation the unknown parameters of a two-dimensional sinusoidal signal model is an important and a difficult problem , The importance of this model in modeling Symmetric gray- scale texture image . In this paper, we propose employment Deferential Evaluation algorithm and the use of Sequential approach to estimate the unknown frequencies and amplitudes of the 2-D sinusoidal components when the signal is affected by noise. Numerical simulation are performed for different sample size, and various level of standard deviation to observe the performance of this method in estimate the parameters of 2-D sinusoidal signal model , This model was used for modeling the Symmetric gray scale texture image and estimating by using
... Show MoreAbstract
The traffic jams taking place in the cities of the Republic of Iraq in general and the province of Diwaniyah especially, causes return to the large numbers of the modern vehicles that have been imported in the last ten years and the lack of omission for old vehicles in the province, resulting in the accumulation of a large number of vehicles that exceed the capacity of the city's streets, all these reasons combined led to traffic congestion clear at the time of the beginning of work in the morning, So researchers chose local area network of the main roads of the province of Diwaniyah, which is considered the most important in terms of traffic congestion, it was identified fuzzy numbers for
... Show MoreProgression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon
... Show MoreThis research paper studies the use of an environmentally and not expensive method to degrade Orange G dye (OG) from the aqueous solution, where the extract of ficus leaves has been used to fabricate the green bimetallic iron/copper nanoparticles (G-Fe/Cu-NPs). The fabricated G‑Fe/Cu-NPs were characterized utilizing scanning electron microscopy, BET, atomic force microscopy, energy dispersive spectroscopy, Fourier-transform infrared spectroscopy and zeta potential. The rounded and shaped as like spherical nanoparticles were found for G-Fe/Cu‑NPs with the size ranged 32-59 nm and the surface area was 4.452 m2/g. Then the resultant nanoparticles were utilized as a Fenton-like oxidation catalyst. The degradation efficiency of
... Show MoreThis research has presented a solution to the problem faced by alloys: the corrosion problem, by reducing corrosion and enhancing protection by using an inhibitor (Schiff base). The inhibitor (Schiff base) was synthesized by reacting of the substrates materials (4-dimethylaminobenzaldehyde and 4-aminoantipyrine). It was diagnosed by infrared technology IR, where the IR spectrum and through the visible beams proved that the Schiff base was well formed and with high purity. The corrosion behavior of carbon steel and stainless steel in a saline medium (artificial seawater 3.5%NaCl) before and after using the inhibitor at four temperatures: 20, 30, 40, and 50 C° was studied by using three electrodes potentiostat. The corrosion behavior was
... Show Moreترك السلطان عبدالحميد الثاني بصماتهُ على أخاديد الزمان وعلى خارطة المشرق العربي الخاضع للسيطرة العثمانية أنذاك ، لكونهُ أهم شخصية أسلامية غير عربية واجهت الخطر الصهيوني ومحاولاتهم الإستيطانية في مشرق الوطن العربي ، على الرغم من صعوبة الظروف التي كانت تمر بها الدولة العثمانية داخليا ً وخارجيا ً، بما فيها من أطماع اقتسامها بين الاوربين ولذا سموها بالرجل المريض .
The current article focuses on studying the social organization reality of the Iraqi society; it aims to construct an Iraqi organized personality that believe in the principles of Islamic religion by making use of the sociology thoughts in explaining the strength of social organization, and the causes of social deviance in attempt of decreasing the deviance and strengthening the cohesion of Iraqi character.
The researchers put forward some questions: to what extent the western theoretical pattern can succeed in explaining the social organization of the Iraqi society? What is the more appropriate western theory for diagnosing the cohesion and deviance of the society? What is the s
... Show MoreAbstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un
... Show MoreThe Journal of Studies and Researches of Sport Education (JSRSE)
Addition of bioactive materials such as Titanium oxide (TiO2), and incorporation of bio inert ceramic such as alumina (Al2O3), into polyetheretherketone (PEEK) has been adopted as an effective approach to improve bone-implant interfaces. In this paper, hot pressing technique has been adopted as a production method. This technique gave a homogenous distribution of the additive materials in the proposed composite biomaterial. Different compositions and compounding temperatures have been applied to all samples. Mechanical properties and animal model have been studied in all different production conditions. The results of these new TiO2/Al2O3/PEEK biocomposites with different
... Show More