Passes the Arab order moment political precision of disruption and discord and
differences of countless between its components and its parts because of the suffering he
endured and the suffering now from internal disturbances as a result of lack of cohesion
relations intra-and cultural, historical and lack of interaction between these components so
that became the focus of the policies and interests is an unprecedented degree , reduced with
the joint Arab action to the minimum, and began to focus on the interests of special
regulations.
This is with regard suffering internally, but externally the regime Arab Regional is absent the
biggest influence on international decisions because of the courtesies which were carried out
at the expense of causes, which came courtesy and concessions as a result of being under full
control of regional powers and international organizations of the United States of America
and before the United Kingdom and its allies.
, the Arab system, both regional and internal mobility is witnessing a large and
impressive, and as a result of internal pressure and external, and many of the challenges and
rapid changes, which revealed the failure of Arab regimes in the management of political
crises of internal and external. On the other hand all the Arab people's ambition and hope that
the rise Arab regional system to a level that achieves the self-Arab, away from all selfinterest,
personal, and this requires hard work and fixed a bug within the system and within the governing same absent democracy and human rights, and what happened in Tunisia sister
of the projection of the regime, and was followed in Egypt, and the reaction of the Arab
masses in most of the precincts is nothing but a clear and strong will to abandon the Libyan
political system, if it amounts to a roiling torrent.
تم التطرق في هذا البحث الى دور الذكاء الاصطناعي والتكنولوجيا الحديثة في العملية التدريبية بما يخدم أهدافه والاستفادة منه من خلال المخرجات الجيدة، حيث ان توظيف التكنولوجيا في تدريب رياضة المبارزة يسهل العملية التدريبية على المدرب واللاعب ويساهم في تقليل الجهد المبذول والوقت المستغرق ، وهدفت الدراسة الى التعرف على تأثير الجهاز المصنع في ضبط المسافة بين القدمين لدى عينة البحث ،استخدم المنهج التجريبي بت
... Show MoreThis paper including a gravitational lens time delays study for a general family of lensing potentials, the popular singular isothermal elliptical potential (SIEP), and singular isothermal elliptical density distribution (SIED) but allows general angular structure. At first section there is an introduction for the selected observations from the gravitationally lensed systems. Then section two shows that the time delays for singular isothermal elliptical potential (SIEP) and singular isothermal elliptical density distributions (SIED) have a remarkably simple and elegant form, and that the result for Hubble constant estimations actually holds for a general family of potentials by combining the analytic results with data for the time dela
... Show MoreIn this research, the mutual correlations between ionospheric parameters (MUF, OWF and LUF) have been suggested. The datasets of the MUF and OWF parameters have been generated using ASAPS international communication model, while the LUF parameter has been calculated using the REC533 model. The calculations have been made for the connection links between the capital Baghdad and many other locations that spread over the studied zone (Middle East region). The annual time of the years (2009 & 2014) of solar cycle 24 has been adopted to make the investigation in order to get the mutual correlation between ionospheric parameters. The test results of the annual correlation between ionospheric parameters showed that the mutual correlation be
... Show MoreAccurate computation of the roughness coefficient is important in the studies of open channel flow. To measure and identify the hydraulic characteristics of the flow system, the model simulation is necessary to study and get the results of the hydraulic properties to specify Manning coefficient of the Euphrates River. In this study, the reach is extended along the Euphrates River from Haditha Dam to Ramadi Barrage with a distance of 169km. The HEC-RAS model was implemented to simulate the flow within the study reach. The geometry of the river was represented by more than two hundred cross-sections surveyed in 2013 and 2021. The model was calibrated using some observed discharges at the Heet gage station for records of th
... Show MoreThe aim of present study to investigate the effect of Coraindrum sativum leaves extract on reproductive activity of male albino mice .Thirty male mice with age of 80-100 day and weight between 25-30 g were divided into three groups: group 1 (untreated), group 2 and 3 were administrated orally for 30 days with aqueous extract of Coraindrum sativum leaves at dose 125 and 250mg/kg.b.w. respectively. The following parameters were evaluated: serum testosterone levels, testes weights, sperm characteristics [motility, viability, spermatozoa, morphology and concentration] and histology changes of the testis. The results showed that the treatment caused highly significant degrease (P<0.01) in testosterone levels and the weight of testes assoc
... Show MoreThe aim of present study to investigate the effect of Coraindrum sativum leaves extract on reproductive activity of male albino mice .Thirty male mice with age of 80-100 day and weight between 25-30 g were divided into three groups: group 1 (untreated), group 2 and 3 were administrated orally for 30 days with aqueous extract of Coraindrum sativum leaves at dose 125 and 250mg/kg.b.w. respectively.
The following parameters were evaluated: serum testosterone levels, testes weights, sperm characteristics [motility, viability, spermatozoa, morphology and concentration] and histology changes of the testis. The results showed that the treatment caused highly significant degrease (P<0.01) in testosterone levels and the weight of testes ass
Background: Chief complaint of patients attending dental clinic represents the first step towards treatment plan. However, most of patients are not aware but the extent and severity of periodontal disease, which could be also, misdiagnose by the dentist. Aim of the study: To investigate whether reported chief complaint(s) are consistent with oral hygiene status Materials and methods: Records of 1102 patients, attending periodontics clinics in the college of dentistry/ university of Baghdad, were used to determine ten most commonly reported chief complaints. Sample of patients was further subdivided according to gender and age. In addition, plaque and gingival index were recorded to determine oral hygiene status. Results: Patients mostly
... Show MoreA total of 47 samples were collected from different clinical specimens (urine, wounds, burns, sputum, blood, stools) during the period from November 2013 to
January 2014, only 18 isolates (38.29%) were identified as Klebsiella pneumoniae ,11isolates (23.4%) as E. coli , 9 isolates (19.1%) as S. aureus, 3isolates (6.3%) as Psedomonase spp., 2 isolates (4.2 %) as K. terrigena and 4 isolates (8.5%) as K. oxytoca. The results were shown the elevation of K. pneumoniae percentage among the bacterial isolates depending on cultural, microscopically, biochemically characteristics and confirmed by using the API 20E and VITEK 2 system . Also K. pneumoniae isolates were more frequently in sputum samples then burns, stools , urine, wounds ,and blo
Regarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra
... Show More