The Interests of British Military in Iraq was not based upon unified vision for the Iraqi identity ,it worked on breaking that identity and deal with the different ethnic and religious minorities and tried to bring it to its side and use it and its figures in the governmental position ,the aim was to make these minorities and here to the Britain to achieve its purposes and strategies in Iraq also vowed to provoked discord social conflicts between the components of Iraqi society.
However , the British military administration depended the portioning and deepen the cracks by depending on ethnic as well as religious minorities to achieve its plans in the future and plays on the string of these minorities under the pretext of defending it and its deprived rights , it was the alibi were allathurion and Kurds were used later through the use of their religious sympathies and feelings that reject the rule of majority of Arabs.
This issue aimed to create conflicts and states of instabilities inside Iraq.
Capital Adequacy is on of the most importance of financial position element because its role is enhance against varions risks of Banking procese . Which this risks is a result of the nature of its operations , investment , Financing tools in addition , in order to Faced any clients withdraws un expected .
So This study aim to measure The Capital Adequacy according to basel II and explin the different risk in the Islamic Bank as aresult to nature and different investment and financing tools as participation speculation , murabah and natures of its assets and liabilities related to commercial banks .
Find out we concludes that the Islamic Banks needs to increase the ca
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThis research aims to know the reality of succession planning in the researched organization and how it occupies the important jobs in the organization and its readiness for sudden and urgent events that lead to the vacancy of these jobs, and the importance of this research is that it is one of the rare Arab and Iraqi studies and research in this field, as it is one of the first researches It deals with the reality of succession planning in light of the retirement law No. (26) of 2019, and the research problem was the absence of consecutive planning programs and the weak preparation of suitable candidates to face sudden and urgent conditions as replacements for current leaders who occupy the leading and key positions in the depar
... Show MoreThe current paper aims at knowing the effect of Exemplar of Wettli On Acquiring Grammatical Concepts Among Basic 7th Class Female Students in Kurdish Language Grammar.
The current paper is confined to a sample of Basic 7th Class Female Students- Khaniqin –belonged Morning schools for the academic year 2014-2015 . The sample amounted 50 female students distributed on two sections ( A,B) . Section A represented experimental group ( 24) female students studied according to the exemplar of ( Wettli) and (B) represented control group (26) female students who have studied with traditional method. The researcher has qualified between these two groups b
... Show MoreAbstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emp
... Show MoreThat communication between people is not only through speech but includes other images of the most important body inspiration. And that the Koran worked on the diversity of ways in which the meanings of the hearer and did not stop at the limit of speech, but included situations where the use of body inspiration and indicate its importance in communication. However, signals and organ movements play a major role in the process of communication between people. Facial and hands movements play an important role in the communication process as they are a tool for communicating ideas to others.
Abstract
In light of the great technological development and the emergence of globalization has increased global competition, where it became competitive exercise pressure on all sectors. In light of this companies mast enviorment depend on the means that keeps them on the competitive position through access to information about competitors in order to help them to draw a strategy that will achieve a competitive edge either through excellence or reduce the costs of their products and this means intelligence competitive and reverse engineering that help to gain information on competitors analyze and put of the decision-maker From this point formed the idea of research in the statement of the role of
... Show MoreThe research aims to study some of the human characteristics of the state of Singapore to know the impact of these characteristics on the strength of the state, its development and. The research included two aspects, theoretical and analytical, using the descriptive analytical method, force analysis method, as well as the historical method. The data was analyzed according to mathematical equations, including the size of the country's population, the extraction of the population growth rate and the concept of age structure, where some indicators related to this concept have been explained. The researcher reached a set of results, the most important of which were: that the population size of the state of Singapore in the period between (19
... Show MoreSentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreABSTRACT
The research aims to study the effect of the commodity dumping phenomenon that Iraq suffered after 2003 on the consumption pattern of individuals, towards the acquisition of non-essential goods (luxury). To achieve our goal we relied on the questionnaire as a main tool for obtaining information related to the research, and it was distributed on a random sample of consumers in the city of Baghdad with 250 questionnaires. The answers of the research sample were analyzed using the statistical program (SPSS). The percentage weights and the factorial analysis method were used also to arrange the variables that affected on changing consumption patterns. The research reached a set of conclusions:
... Show More