إن موضوع الشرق الأوسط بشكل عام اتخذ أهمية كبيرة في الكتابات والمؤلفات التي صدرت منذ بداية النصف الأول من عقد التسعينات من القرن المنصرم مع بدايات مشاريع السلام التي أعقبت انهيار الاتحاد السوفيتي وتغير الخارطة السياسية والاقتصادية والايديولوجية للعالم .وعلى الرغم ان المصطلح ليس بجديد الا ان تعابير المصطلح وددلالاته تتغير مع تغير موازين القوى واتجاهات المصالح. إذ انتقل من مصطلح جغرافي الى سياسي وهاهو يطرح من جديد على انه مصطلح اصلاحي ذو دلالات ديمقراطية وأهداف استراتيجية بعيدة المدى. وطروحات ومسميات هي في حقيقتها أهداف يةودية وامريكية يجري تنفيذها عبر خطط ومشاريع تبدأ بمقترحات تنتهي بفرضها على ارض الواقع بشتى الوسائل حتى القوة.ومشروع الشرق الأوسط الكبير لا يختلف عن هذه الحقيقة .فبعد احتلال العراق بدأت الولايات المتحدة بطرح مشاريعها لترتيب الخارطة السياسية والاستراتيجية للمنطقة المهمة بالنسبة لها اقتصاديا واستراتيجيا وسياسيا وحتى دينيا وحضاريا, متخذة من العراق قاعدة للانطلاق والضغط على الوطن العربي والدول الاخرى التي تمثل بمجملها اطراف المشروع الامريكي القديم بولادته والجديد بطروحاته وادوات تنفيذه.وهذا ما استندنا علية في اثبات فرضيتنا التي تقوم على فكرة ان جميع الطروحات والمشاريع والترتيبات التي طرحت وما زالت تطرح للمنطقة ومسارات التغيير فيةا والذي من المفترض ان يكون نحو الديمقراطية مرتبطة تعتمد على مضامين واليات تحقيق الشرق الاوسط الكبير , والعراق له دور محوري في هذه الاجندة لان اي تغيير في العراق سيتحكم بتغيير محتمل اقليمي او عربي اخر, هذا هو المخطط الامريكي والغربي لمناطق الطاقة والثروة .
Education is considered the corner stone of all nations development. It is the principal way for the development of human sources and the most achievements of the age due to the knowledge of these resources .
As its active role which accounting departments implement in Iraq universities , (public and private) through their teaching programs , they aim to supply labour-market with qualified cadre graduated as accountants auditors , tax auditors , financial analysts , ac
... Show MoreBackground: This study aimed to determine the gender of a sample of Iraqi adults utilizing the mesio-distal width of maxillary canines, inter-canine width and standard maxillary canine index, and to determine the percentage of dimorphism as an aid in forensic odontology. Materials and methods: The sample included 200 sets of study models belong to 200 subjects (100 males and 100 females) with an age ranged between 17-23 years. The mesio-distal crown dimension was measured manually, from the contact points for the maxillary canines (both sides), in addition to the inter-canine width using digital vernier. Descriptive statistics were obtained for the measurements for both genders; independent samples t-test was performed to evaluate the gende
... Show MoreTo investigate the relationship between increased lipid peroxidation, and the lowering of both plasma total proteins and albumin in lead-exposed workers, and the effectiveness of antioxidants (vit. C and E) in modulating oxidative stress in those workers.
Thirty male and females workers employed in the Iraqi storage battery (age range 20-40 years) were participating in this study. Additionally, 11 healthy subjects were served as healthy controls, with the same age range compared to workers group, to avoid the effects of age variations on the studied parameters. Blood lead levels, erythrocytes and plasma MDA, erythrocytes and plasma GSH, total protein and albumin levels in healthy controls and lead-exposed workers pre- and post-tr
... Show MoreAim: The purpose of this study is to compare the effect of epineurotomy of median nerve with just division of the transverse carpal ligament in the treatment of carpal tunnel syndrome. Patients & Methods: We conducted a prospective, random study to evaluate the effect of epineurotomy on the outcome of operative treatment of established median-nerve compression in the carpal canal. Fifty hands (forty-four patients) were selected randomly into two groups: group I had a release of the transverse carpal ligament alone, and group II had a release and adjuvant epineurotomy of the median nerve. The groups were similar with regard to age group, gender, duration of symptoms, and preoperative physical findings. All patients had electrophysiological e
... Show MoreMedia theories and studies have provided many diligences on the concept of social media and the circle of influence, including the theory of social marketing which deals with how to promote ideas espoused by the elite in a society to become a recognized social value. The emergence of social networks provided a revolutionary breakthrough, taking the media to unprecedented horizons; and giving its users great opportunities to influence and move across borders without restrictions and censorship, except in a relatively limited manner. So, the emergence of social media has created channels of live broadcasting from its audience in a method of development that changes the essence of the known communication theories; and stops the monopoly of th
... Show MoreThe world is moving towards greening business in general and production systems in particular. At the same time, economic units seek to enhance their productivity and find any variables that can contribute to improving their elements. Economic units should not ignore the green dimension of cost management techniques because of its role in containing the green dimension of the production system and the product. However the few researches dealt with the subject of the green kaizen showed its role in reducing costs and improving the environment. Those researches did not address its contribution to raising the level of productivity. Productivity is an important indicator of economic units that expresses their level of success and progre
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show More