The Interests of British Military in Iraq was not based upon unified vision for the Iraqi identity ,it worked on breaking that identity and deal with the different ethnic and religious minorities and tried to bring it to its side and use it and its figures in the governmental position ,the aim was to make these minorities and here to the Britain to achieve its purposes and strategies in Iraq also vowed to provoked discord social conflicts between the components of Iraqi society.
However , the British military administration depended the portioning and deepen the cracks by depending on ethnic as well as religious minorities to achieve its plans in the future and plays on the string of these minorities under the pretext of defending it and its deprived rights , it was the alibi were allathurion and Kurds were used later through the use of their religious sympathies and feelings that reject the rule of majority of Arabs.
This issue aimed to create conflicts and states of instabilities inside Iraq.
Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe study aims to identify the impact of the implementation of the integrated education strategy in the curriculum of the Arabic language for the seventh grade on the academic achievement in the schools of the capital Amman. The researcher adopted the experimental method, where two divisions of the seventh grade students were chosen from the secondary school for girls. The sample of the study was 60 students divided into two equal groups: 30 students represented the experimental group (A) and (30) students represented the control group. To collect the needed data, a test of (40) Multiple Choices was used. The results showed statistically significant differences between the mean scores of the experimental group who were taught acc
... Show MoreThis work reports the development of an analytical method for the simultaneous analysis of three fluoroquinolones; ciprofloxacin (CIP), norfloxacin (NOR) and ofloxacin (OFL) in soil matrix. The proposed method was performed by using microwave-assisted extraction (MAE), solid-phase extraction (SPE) for samples purification, and finally the pre-concentrated samples were analyzed by HPLC detector. In this study, various organic solvents were tested to extract the test compounds, and the extraction performance was evaluated by testing various parameters including extraction solvent, solvent volume, extraction time, temperature and number of the extraction cycles. The current method showed a good linearity over the concentration ranging from
... Show MoreThe present study aims to identify the socio-psychological implications that police investigators experience regarding the variable of gender, age, place of residence, qualification, military rank, and work experience. The study included 6 individuals who were working in investigation department in Hebron district as a sample. The results demonstrated that the targeted sample had a dump attitude toward the socio-psychological implications. The psychological implications reflected 2.8739, the social side represents 3.2956.
Background: This study was conducted to assess the effect of sonic activation and bulk placement of resin composite in comparison to horizontal incremental placement on the fracture resistance of weakened premolar teeth. Materials and method: Sixty sound human single-rooted maxillary premolars extracted for orthodontic purposes were used in this study. Teeth were divided into six groups of ten teeth each: Group 1 (sound unprepared teeth as a control group), Group 2 (teeth prepared with MOD cavity and left unrestored), Group 3 (restored with SonicFill™ composite), Group 4 (restored with Quixfil™ composite), Group 5 (restored with Tertic EvoCeram® Bulk Fill composite) and Group 6 (restored with Universal Tetric EvoCeram® co
... Show MoreElastic electron scattering form factors, charge density distributions and charge,neutron and matter root mean square (rms) radii for P24PMg, P28PSi and P32PS nuclei arestudied using the effect of occupation numbers. Single-particle radial wave functionsof harmonic-oscillators (HO) potential are used. In general, the results of elasticcharge form factors showed good agreement with experimental data. The occupationnumbers are taken to reproduce the quantities mentioned above. The inclusion ofoccupation numbers enhances the form factors to become closer to the data. For thecalculated charge density distributions, the results show good agreement withexperimental data except the fail to produce the hump in the central region for P28PSinucleus.
... Show MoreType 2 diabetes mellitus (T2DM) became the most prevalent health problem. Almost half of the world's people are ignorant that have diabetes. Menopause occurs as an important alteration in women through which take place the change in sex hormones, distribution in fat،s body, and metabolism, altogether which participate in the metabolism disease such as type 2 diabetes mellitus. Several studies have appeared the association between the TCF7L2 gene and different diseases like type 2 diabetes mellitus (T2DM). This study aimed to detect the relation of the genetic variation polymorphism for the TCF7L2 gene (rs12255372 G/T) in Iraqi women menopausal with T2DM. The outcomes indicated the increased levels of biochemical characteristics including H
... Show More