The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and assumptions
هدفت الدراسة الى تحديد الكفايات التدريسية اللازمة للطالبات- المدرسات من وجهة نظرهن وذلك للتعرف على مدى حاجتهن لهذه الكفايات التدريسية التي ينبغي امتلاكها لتحقيق الاهداف المنشودة.أشتملت عينة البحث على(100) طالبة من جامعة بغداد/كلية التربية للبنات/قسم التاريخ.تم اعداد اداة البحث وهي أستبانة مكونة من (43) فقرة خماسية البدائل هي (موافقة بشدة، موافقة،مترددة،غير موافقة،غير موافقة بشدة) موزعة على
... Show MoreThe Ayyub era witnessed a popular for science, knowledge and became the Ayyub state in its various regions a scientific beacon، despite their preoccupation with wars with the Crusaders now that did not discourage them from their care for science and scientists، and this scientific renaissance had many factors، foremost of which are the tendencies of the sultans and Ayyub kings to pay attention to science and its care، through their establishment of the role of science
خضعت المحاسبة الإدارية إلى هيمنة المحاسبة المالية عليها اثر ظهور القوائم المالية المدققة في بدايات القرن الماضي الناتجة من ظهور المنظمات المنظمة للمهنة وما رافق من إلزام الشركات بإعداد التقارير المالية من الحسابات المالية وفقاً للمبادئ المحاسبية المقبولة قبولاً عاماً والتي أثرت في قيمة المعلومات المقدمة من قبل المحاسبة الإدارية مما أدى إلى إن تصبح تلك المعلومات غير ملائمة للاستخدام الإداري وهو ما ا
... Show MoreThe Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods.
The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for
... Show Moreعُني العرب منذ القدم بإستعمال الجواهروالأحجار الكريمة ، وإزدادت هذه العناية على مر العصور ، فقد إستعملوا الحلي المتنوعة ، والملابس المطعمة بالجواهر والأحجار الكريمة .
الجمود المؤسسي واثره في فشل التنمية السياسية : محاولة من اجل بناء مفهوم
Background: preparation of root canals is an important step in root canal treatment. Mechanical instrumentation of root canals cause an irregular layer of debris, known as the smear layer. As a result, several studies reported that preferring the removal of the smear layer. Objective: To study the influence of the energy (100 mJ) of Erbium, Chromium: Yttrium Scandium Gallium Garnet (Er,Cr:YSGG) laser at short pulse duration (60 μs) on smear layer removal of apical third after using Photon induced photoacoustic streaming technique. Materials and methods: Eighteen straight single-rooted mandibular premolars were used. The roots length were uniform to 14mm from the anatomic apex and
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe Negro minority in the United States is associated with social injustice,
political deprivation, and economic oppresion. Its members felt that they are
second-class citizens, and that the acceptance of such status will lead to the
continual oppresion of the Whites upon them. As a result, the educated community
adopted a process to put a framework to their opposition to the former's injustice.
This organised framework is exemplified in the "Niagara Movement," which is
regarded as the first national organisation for Negros. The topic of this study is
chosen due to its historical and political significance.
The study consists of an introduction and five sections. The first section
addresses the preliminaries an
This study attempts to highlights on the evaluation of performance efficiency for Investments in both National & Iraqi Insurance companies for the years 2001-2010 and their importance on those companies and the economy of the country in order to find out the investment areas and to compare between investment activity and its revenues as well as to compare performance of both companies in investment field.
The study was based on annual reports and balance sheets of both companies. In many chapters, this study dealt with theoretical and practical aspects of the investments and its revenues. Key hypothesis was based on this study, including four parts of Sub hypotheses about (statistical effective relationship between the
... Show More