Abstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under equipped blue helmets have struggled to carry out ambitious mandates while facing severe challenges in the Central African Republic, Mali, South Sudan and elsewhere, only thinly papered over by the international responses to date.
This research aims to numerous risks to the portfolio of the insurance company that arise from practicing the activity in general, and the risks arising from insurance contracts in particular, and what is the role of the company in the disclosure to help users (such as owners) to understand and concentration of risks in the financial reporting and identifying movable risks size to reinsurers that may affect the solvency of the portfolio and makes them at a given moment required to fulfill the obligations towards policyholders outweigh the financial capacity, which leads to stumble or bankruptcy.
So I sought this research is to identify the extent of the obligation to disclose the accounting for this risk and the extent of their i
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
Aim: To evaluate the effect of ultrasonic agitation for retrograde biodceramic root repair, MTA and biodentine filling materials on push-out bond strength to dentine walls. Materials and Methods: Ninety extracted human teeth with single straight roots were selected randomly. After disinfection and cleaning, the coronal portions were sectioned to standardize the root canal length at 15mm. following root canal shaping, obturation and apical roots resection, retrograde cavities were prepared. Teeth were categorized depending on the filling material used into three groups, 30 teeth each. Group A filled with bioceramic root repair material, B with MTA and C with Biodentine material. These groups were divided in to three subgroup (n= 10). Subgrou
... Show MoreThis research sheds light on the morphological structure of nouns and verbs in the novel "ASTONISHMENT" by the novelist Aharon Applefield by analysing selected models from the novel in a morphological analysis in order to identify the most important morphological features of this structure according to a statistical analytical approach.
The morphological structure is the main pillar of the linguistic structure of the literary text. Morphology is the science that studies the word, by which its structure and original letters are known, and the change that has occurred to it. The aesthetics of the fictional text is reflected in this structure, through which the writer conveys his ideas and narrations to the reader. The research
... Show MoreThe oil sector in Iraq suffered from several difficulties led to the decline and reduction of oil production and the deterioration of refineries and transport pipeline status in addition to the weakness of the technology side and the prevalence of financial and administrative corruption besides the high costs of rehabilitation of the oil sector and also administrative and institutional problems still ongoing.
In spite of Iraq's possession of vast oil wealth allows him to play an important role in the international energy market، he is still under the level. The production of oil doesn'<
... Show MoreLanguages were not found in our life in a way utter coincidence , and it’s not flounce on people’s tongue randomly ‚ but laws are the controlling in languages‚ these laws could be lift to the same level of natural laws‚ phonetics form the main part in producing those languages‚ the Arabic language is one of those languages ‚ it’s largest dialects in Arabian Peninsula according to speakers number ‚ Arabic language link with these dialects through properties and phenomena sound and grammar‚ from this point my topic search is came Similar and different between Arabic and Arabian peninsula Accents balance linguistic–study voice of the Seine typically ) . and Similar and different of the ph
... Show MoreObjective: To investigate and prove that aspirin
protects, or at least attenuates amikacin ototoxicity in
humans.
Method: This study was conducted in 60 patients that
completed all
requirements .The patients were divided into two
groups:
• Control group: receive placebo treatment.
• Drug–treated group: They receive aspirin
coated tablets (1.5gm/ day), 500mg 8 hourly.
Both groups had similar aspects regarding the gender,
age and weight. The duration of therapy was 7 days
and dosage of amikacin was 1gm/day (500mg 12
hourly).
Results: Comparison of Audiometry test in
Ear/Nose/Throat (E.N.T.) Department (Pure Tone
Audiometry) at 1000 Hertz (Hz), 2000 Hz, 4000 Hz,
and 8000 Hz showed sig
In the years recently city planning projects have been confirmed sustainable high concentration on planning streets and pedestrian paths being the most prominent component of the urban structure in the city and these me and diverse departments link the city’s sectors and serve as a space for economic, service, and social activities. On the other hand, pedestrian traffic is an essential component of the various means of transportation within the city. Suffer cities in the Middle East and Arab cities in particular are neglecting pedestrian paths in the vital urban environment. Vehicle control mechanisms on roads, and changing the uses of pedestrian paths as result of encroaching on the sidewalks designated for pedestrians. Which leads to a
... Show MoreThis study focuses on how tax administrations in Iraq use Artificial Intelligence (AI) techniques to monitor tax evasion for individuals and companies to achieve Tax Compliance (TC). AI was measured through four dimensions: Advanced Data Analytics Techniques (ADAT), Explainable AI (EAI), Machine learning (ML), and Robotic Process Automation (RPA). At the same time, TC was measured through registration, accounting, and tax payment stages. We relied on the questionnaire form to measure the variables. A sample of employees in the General Tax Authority in Iraq was selected, and a questionnaire was distributed to 132 people. The results indicated that the dimensions of AI affect achieving TC at all stages. This study provides evidence of using A
... Show More