Preferred Language
Articles
/
jcopolicy-599
The US-Iranian dispute and its repercussions on Iraq After 2003
...Show More Authors

Receipt date: 8/8/2020 acceptance date: 9/11/2020 Publication date: 31/12/2021

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

           The American-Iranian relations have been characterized by tensions since the arrival of the guardian jurist regime in Iran to leadership in 1979, as it was considered a turning point not only in the context of relations between the two countries, but also in the context of Iranian relations with the West in general, and through the first and second Gulf wars. This stage was coupled with the United States imposing economic sanctions and severing diplomatic relations with Iran, up to the beginning of the twenty-first century and the attacks of September 11, 2001, which contributed to increasing tension between the two countries after Iran's inclusion in the Axis of Evil states, despite Tehran's official condemnation and rejection of these attacks. The reasons for the disagreement between the two countries lie in Washington's fear of a radical, theocratic regime that seeks to adopt an expansionist project in the Arab region, by employing the sectarian factor, which contributes the destabilization and regional imbalance of power in one of the most important areas that threatens US national security, this is due to the considerations of the region's strategic reserves of energy, in addition to the presence of Israel. The importance of Iraq lies in this conflict, as it is the gateway from which Iran can gain access to and influence in the region, benefiting from the rapprochement and sectarian and cultural homogeneity with large segments of the Iraqi society, in addition to the mistakes of the American foreign policy and the failure of its strategy in Iraq and the region, it is imperative that the American administration maintain its military presence in Iraq to contain Iran and cut its arms extending to Syria and Lebanon. On this basis, we can consider Iraq the only loser in this difficult equation, and its field is prepared to settle external accounts at the expense of its national interest.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
A topology on a ring part of is-algebra
...Show More Authors

Scopus (2)
Scopus Clarivate
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus (1)
Scopus
Publication Date
Mon Jul 01 2019
Journal Name
Arpn Journal Of Engineering And Applied Sciences
PSEUDO RANDOM NUMBER GENERATOR BASED ON NEURO-FUZZY MODELS
...Show More Authors

Producing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce

... Show More
View Publication
Publication Date
Fri Jan 04 2019
Journal Name
Journal Of Planner And Development
Impact of D.B.M. Best practices on Community Rehabilitation Projects
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Thu Feb 02 2012
Journal Name
Education College Journal/al-mustansiriyah University
On Significance Testimator in Pareto Distribution Via Shrinkage Technique
...Show More Authors

In this paper, preliminary test Shrinkage estimator have been considered for estimating the shape parameter α of pareto distribution when the scale parameter equal to the smallest loss and when a prior estimate α0 of α is available as initial value from the past experiences or from quaintance cases. The proposed estimator is shown to have a smaller mean squared error in a region around α0 when comparison with usual and existing estimators.

Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Assessment of X-Ray Effects on HF Radio Communications
...Show More Authors
Abstract<p>This study aims to determine the effect of x-ray radiation resulting from solar flares in high-frequency radio wave communications through the ionosphere and to study the radio blackout events that occur over Iraq, located within (38,28) latitude, and (38,49) longitude. Using X-ray data during strong X flares and radio wave absorption data across the D ionosphere for 10 years from 2012 to 2021. The study concluded that there were 43 events of x-flare, most of which were during years of high solar activity. All of these flares produced X-rays that caused a radio blackout, R3 and only 13 events affected Iraq.</p>
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Gamma irradiation effect on characterization of MoO3 nanostructures films
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Nov 15 2017
Journal Name
Journal Of Pharmacy And Biological Sciences
In-vitro effect of Artemisinin on L. tropica promastigotes
...Show More Authors

Leishmaniasis is a widespread parasitic disease caused by Leishmania parasite, this disease considers a major health problem among worldwide. Treatments available are expensive or with cytotoxic side effect. This study was aimed to investigate the effect of an herbal new compound, called artemisinin, derived from a Chinese plant called Artemisia annua. Various concentrations were studied in vitro against L. tropica amastigotes by chamber counting to investigate its effect on the proliferation of promastigotes. Three incubation periods were adopted (24, 48, 72) hours. The results showed a significant decrease in surviving promastigotes, in parallel with the normal parasite count of untreated promastigotes, along the periods studied. Th

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Recent Trends In Engineering & Research
Password Authentication Based On Modify Bidirectional Associative Memory (MBAM)
...Show More Authors

Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.

Preview PDF