Preferred Language
Articles
/
jcopolicy-627
The Kurdistan Workers Party (PKK) and its Impact on Iraqi National Security
...Show More Authors

The Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar  after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued survival of the Workers Party and its fighters on Iraqi lands, and their continued military operations against Turkey will force Iraq to endure the Turkish forces' raids against them under the right to follow up and use the deterrent defense measure to defend itself. This represents a breach by the Turkish side on Iraqi sovereignty and its effect on Iraqi national security. Therefore, the presence of the PKK in the Iraqi scene and its influence mean that it plays a role in the geopolitical interactions of the Iraqi state, which will in turn affect the Iraqi national security

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
The Impact of Home Economics on High Performance
...Show More Authors

يسعى هذا البحث الى تقديم اطار عملي ونظري حول موضوع "تأثير الاقتصاد المنزلي في تعزيز الاداء العالي" وتم اختبار مخطط الدراسة الفرضي في القطاع التعليمي الحكومي في محافظة البصرة ,ويتضمن عدد من تشكيلات الجامعة التقنية الجنوبية. واستخدمت الاستبانة والمقابلة الشخصية كأسلوب لجمع البيانات للدراسة وكان حجم العينة114 موظف. وقد استخدمت عدد من الاساليب الاحصائية لاختبار فرضيات الدراسة. واظهرت النتائج بأن هناك تأثير ايج

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Motivated Lamentations of Imam Hussein in modern Iraqi poetry
...Show More Authors

The Fountain of poetry Canot be suddenly flow or flood from emptiness. but it is streams and motives drive it to move . Forward tat Calmness and latent in depth of poet ,and try to Chang it in to high wives , go in to details inside the seas of poetry ,to sail threw it on the ships of poetry in creative styel to reach to the point from imaginary meaning , so every poet has direction to competein poetry poetsin Lament of Imam Hussain, There versification of poetry didn’t come from emptiness , but there was clashes motive them threw Calling the personality of Imam Hussain to learn lesson in avery beautiful and greative styel ,to be the expression poem from many sides in the personality of Imam Hussain from that events and facts that happ

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Features experimentation in theater Iraqi academic: يوسف هاشم عباس
...Show More Authors

1.Chapter I (systematic framework) which includes: the research problem and the importance of the research, the need for it, the goals of the research, the temporal &spatial boundaries, determine the terms and defined procedurally.2.Chapter II - the theoretical framework: It consists of three sections are:•The first topic:- the concept of references and experimentation in the theater. •The second topic:- the director of academic and experimentation in Iraq. Two paragraphs in this section came after the introduction, in first paragraph to talk about the Iraqi theater academic and experimentation, and in the second paragraph the researcher spoke about the academic director of the Iraqi and experimentation. 3.Chapter III - Actions -

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
The Impact of Political Thought on Human Rights
...Show More Authors

 Receipt date:11/19/2020 acceptance date:10/1/2021 Publishing date:12/31/2021

   Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

Human rights are one of the basic concepts of modern and contemporary times, and political thought as the origin of political science and its source of knowledge have impact  in this science and its branches

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Strategic Cohesion on Administrative Excellence
...Show More Authors

This research aims to test the effect of strategic cohesion with its dimensions (organizational excitement, organizational casting, organizational synergy) as an independent variable on administrative excellence as a dependent variable in the Ministry of Planning, and through surveying several employees (general managers, heads of departments,  and units managers). As a research community, and based on the importance of the research topic in the aforementioned research community. The researchers have adopted the descriptive-analytical using the questionnaire as the main data collection. 155 questionnaires were distributed, yet,114 of them were retrieved and 110 were used for final statistical analysis. The researchers used the relev

... Show More
View Publication
Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2014
Journal Name
Al-kindy College Medical Journal
Pulmonry function test in spinning and weaving workers in Iraq
...Show More Authors

Background :The cotton factories have difference steps, spinning and weaving are van important parts of the factories. Cotton industry workers are exposed to various hazards in the different departments of textile factories. The major health problems associated with cotton dust are respiratory problems. Cotton workers display an excess of lung function abnormalities when compared to a community control population.
Aim of Study: This study assessed the effect of exposure to cotton dust in spinning and weaving workers on the lung function in Iraq, by measuring Forced Vital Capacity (FVC),Forced Expiratory Volume in the first second(FEV1), FEV1 ∕ FVC Ratio, and Forced Expiratory Flow 50%(FEF50%),with varying degree of reduction in lung

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The impact of dimensions of concerning the distribution of daily Iraqi newspapers informing customer loyalty
...Show More Authors

Abstract

The study deal with two main variables:- the dimensions of distribution, and the customer loyalty . the researcher has chosen samples of Iraqi newspapers like (AL Sabah, AL Mada, AL Bayna aljdeida newspaper), because this product depends greatly on the consumption of customers so as to achieve the success. After studying the dimensions of these variables ( cost, flixibilty & deliver time ) which concerns the distribution, and for these dimensions ( marketing relationship, customer perception, customer experience, brand, & product quality) which relate to the customer loyalty . the problem has been identified in a number of remarks concerning the extent of awareness that the administration

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref