It could be said that the essence of the “quota” is the state’s intervene as external power in bringing positive change for the benefit of the disadvantaged women and cultural minorities, and from the perspective that compensatory justice requires dealing differently with the different parties culturally and economically for the benefit of those deprived of them. Practicing of quotas merely, does not mean the full achievement of equality between cultural and sexual components in general, but it’s a big leap towards achieving this crucial goal, since the latter necessarily requires a range of legal and non-legal mechanisms aimed at empowering women and expanding their capabilities as a whole. On the other hand, in the absence of a written Kurdistan constitution, a package of legal reforms must be implemented in a series of relevant laws and regulations simultaneously, in order to accomplish the main goal which is women's political empowerment in the light of a governing idea that collect between two interrelated aspects: The first is eradicating various legal obstacles related to women's political participation. The second is embodying in combination of taking sanctions against parties that do not adopt quota or adopting it at low rates. At the same time, offering incentives to parties that adopt women quota which exceed the minimum legal quota as well as adopted programs that support women's participation.
This research was carried out to study the effect of plants on the wetted area for two soil types in Iraq and predict an equation to determine the wetted radius and depth for two different soil types cultivated with different types of plants, the wetting patterns for the soils were predicted at every thirty minute for a total irrigation time equal to 3 hr. Five defferent discharges of emitter and five initial volumetric soil moisture contents were used ranged between field capacity and wilting point were utilized to simulate the wetting patterns. The simulation of the water flow from a single point emitter was completed by utilized HYDRUS-2D/3D software, version 2.05. Two methods were used in developing equations to predict the domains o
... Show MoreThe current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreThe study aimed at recognizing the availability of the cultural intelligence dimensions in social studies book at the high school in the kingdom of Saudi Arabia (curricula system- joint program). The study used the descriptive approach and content analysis method. As tools of the study, the study adopted a list of cultural list of indicators and dimensions that suits the secondary stage social curricula. It further adopted a content analysis form designed to analyze the social studies book in the secondary school in the kingdom of Saudi Arabia. The study has reached several results, the most significant results were: There is a difference in including the cultural intelligence dimensions in social studies book at high school in the kingd
... Show MoreAbstract
Magnetic abrasive finishing (MAF) is one of the advanced finishing processes, which produces a high level of surface quality and is primarily controlled by a magnetic field. This paper study the effect of the magnetic abrasive finishing system on the material removal rate (MRR) and surface roughness (Ra) in terms of magnetic abrasive finishing system for eight of input parameters, and three levels according to Taguchi array (L27) and using the regression model to analysis the output (results). These parameters are the (Poles geometry angle, Gap between the two magnetic poles, Grain size powder, Doze of the ferromagnetic abrasive powder, DC current, Workpiece velocity, Magnetic poles velocity, and Finishi
... Show MoreThese days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce
... Show MoreThe subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to
... Show MoreAbstract
Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The sim
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThis research began by explaining its variables and dimensions especially the digital gap, which the authors explained it elaborately beginning with the concept, the reasons blind its emergence of its measurement, and how to treat it. The authors supposed the potentiality of relying on enforcing knowledge in general and the groups suffer from this gap in particular, especially the targeted knowledge to treat its subject.
As enforcing knowledge usually depends on some strategies or choices of organizational orientation among them is learning and training from one side, and communication, as an indicating factor for organizational effectiveness as the authors refer from the other side.