Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their basic needs,altimitly means a decent living and freedom and the end for , and it supposed for most respect for human rights through democratic framework.
The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreScientists have mastered the codification of the hadeeth and authorship in it, and walked in a variety of courses, including what is known when the late books seal books, which is inclined by Sheikh Sheikh students in the last Council is reading a book of the books of the year or so, and mention a party from the translation of the book owner After that methodology of what he sees important, then speak to the last hadeeth in the book Sindh and Manta, and sometimes market attribution to the author of the book as did Suleiman al-Jamal (God's mercy) deceased in 1204 AH, in this seal on the true Imam Bukhari Which we will investigate and publish. (God willing).
Porosity is important because it reflects the presence of oil reserves. Hence, the number of underground reserves and a direct influence on the essential petrophysical parameters, such as permeability and saturation, are related to connected pores. Also, the selection of perforation interval and recommended drilling additional infill wells. For the estimation two distinct methods are used to obtain the results: the first method is based on conventional equations that utilize porosity logs. In contrast, the second approach relies on statistical methods based on making matrices dependent on rock and fluid composition and solving the equations (matrices) instantaneously. In which records have entered as equations, and the matrix is sol
... Show MoreIn the present work, the surface properties of mixed binary surfactants containing sodium dodecylbenzene sulfate (SDBS) and Tween 80 (TW80) surfactants in aqueous solutions were studied at temperature 293 K using surface tension measurements. The critical micelle concentration (cmc) magnitude for both individual surfactants and their mixtures were established the obtained results revealed that the magnitude of cmc of the mixtures are less than the magnitude of individual surfactants and decrease with the increase in Tween 80 percent in solution which indicate the nonideal mixing of the two surfactants. The values of molecular interaction parameters and the mole fraction of surfactants in the micelle (X1) were calculated
... Show MoreAbstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreThere is a relationship between the sizes of urban centers and regional
development, concerning the role that these centers are playing in
developmental process.
The research assume that the urban system in the governorate, has
been affected by the external environment due to the religious dominance of
Kerbla city.
The research is composed of three sections, the first is a theoretical
background, which focus upon the general directions of the models and
theories that have a relationship with the subject. The second is a practical
part aims at determination the characteristics of the sizes of the cities in the
governorate. Depending upon of previous part, i.e., the practical part section three deals with
There is a great risk of cardiovascular disease (CVD) and vascular thrombosis in patients with End-Stage Renal Disease (ESRD). These patients exhibit numerous abnormalities in coagulation, fibrinolytic, inhibitory protein abnormalities in multiple levels. The study aimed to assess hypercoagulable changes by measuring the levels of antithrombin, plasma fibrinogen and FXII activity in patients with ESRD, and to find their correlation with Hemoglobin (Hb) level, WBC count, reticulocyte percentage and platelet count. This study was conducted at Al-Hayat center, Al Karama Teaching Hospital on 50 ESRD patients aged < 60 years of both genders. In addition, 20 apparently healthy individuals were included as a control group. The mean Hb level, total
... Show MoreThe oncolytic viruses are promising form of cancer therapy which is based on the selectively killing of the cancer cells. This study was aimed to investigate the role of Newcastle disease virus (NDV) Iraqi strain AD2141 in apoptosis. Firstly, the virulence of AD2141 was detected in embryonated chicken eggs after 48hrs of infection. It was observed a hemorrhage in the skin of infected embryos that led to death. Then, the ability of this strain for regression cancer cell lines was examined. By using cytotoxicity test, it was found 128 HAU/ml of AD2141 had a potent inhibition against growth of RD and AMN3 after 72hrs of exposure time; the inhibition rate was 86.8% and 86.98% respectively. Moreover, the apoptotic activity of AD2141 was exami
... Show More