Following the political development in Iraq Since 7112 exposed kind of political traditions about how to manage the conflicts that have different Iraqi powers .That what was clear since the formation of permanent government since in 7112 .
The case of conflict between political powers in administrating Iraq state and the withdrawal of American Forcesintroduces questions:
0-Is it possible that that the beginning of Iraq state building shall ease this conflict and peacemaking in the post-conflict period?
7- To what extent the Iraqi powerswas to manage their disputes in non-military like elections which was held in 7112?
2- What is the range of the extent of the political operation after the American withdrawal?
The important if the study lurks in searching the modern and contemporary history of Iraq and analyzes the role of the political forces and the decisions and its effects on the state administration, and analysis related to the security and stability in the light of the American occupation and its role in reaching to Iraq to the present situation. It open new horizon before the postgraduate students to question such topics in their in their theses to shed light on the historical issues which Iraq has gone through economical and political instability throughout regional and international sequences.
A new way to Systems concentrates have been clarified and that allows a concentration high and analysis to automatically wavelengths of the spectrum of this system analyst of the spectrum and the center is built on Holucram Nafez gives less absorbency with efficient diffraction high when the wavelength (900 nm), which will be useful for Khallaya solar
In the present study twenty samples of human urine were taken
from healthy male and female with different of: ages, occupation and
place of residence. These samples were collected from the hospital to
measure the concentration of radon gas in human urine by using one
of solid state nuclear track detectors LR-115.
The results obtained of the concentrations of radon in healthy human
urine are varying from 2.12×10-3 Bq.l-1 to 4.42×10-3 Bq.l-1 and
these values are less than the allowed limits 12.3×10-3 Bq.l-1.
The aim of this work is to study the correlation between the electrons for Li atom in ground state through the calculation of the inter-particle distribution function f (r12) and inter-particle expectation values . By using the f(r12) function for KL shell in both singlet and triplet state .The Fermi hole have been evaluated .In this work the Hartree-Fock wave function (1993) have been used.
This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV
... Show MoreThe aim of this study is to compare and contrast the science process skills (SPS) included in the 10th-12th grade physics textbooks content utilized in Yemeni schools. The study revealed weaknesses and strengths in the textbooks’ content. For instance, a number of science process skills (SPS), such as measuring, predicting and hypothesizing, have been neglected in the 11th grade textbook. For all three textbooks content, the maximum percentage of basic science process skills (BSPS) was devoted to observation. However, the maximum percentage of integrated science process skills (ISPS) was different for each grade: experimenting had the highest percentage for 10th grade, interpreting data for 11th grade, and operational definitions for 12th
... Show MoreIn the years recently city planning projects have been confirmed sustainable high concentration on planning streets and pedestrian paths being the most prominent component of the urban structure in the city and these me and diverse departments link the city’s sectors and serve as a space for economic, service, and social activities. On the other hand, pedestrian traffic is an essential component of the various means of transportation within the city. Suffer cities in the Middle East and Arab cities in particular are neglecting pedestrian paths in the vital urban environment. Vehicle control mechanisms on roads, and changing the uses of pedestrian paths as result of encroaching on the sidewalks designated for pedestrians. Which leads to a
... Show MoreRenewable energy resources have become a promissory alternative to overcome the problems related to atmospheric pollution and limited sources of fossil fuel energy. The technologies in the field of renewable energy are used also to improve the ventilation and cooling in buildings by using the solar chimney and heat exchanger. This study addresses the design, construction and testing of a cooling system by using the above two techniques. The aim was to study the effects of weather conditions on the efficiency of this system which was installed in Baghdad for April and May 2020. The common weather in these months is hot in Baghdad. The test room of the design which has a size of 1 m3 was situated to face the geographical south. The te
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More