Preferred Language
Articles
/
jcopolicy-627
The Kurdistan Workers Party (PKK) and its Impact on Iraqi National Security
...Show More Authors

The Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar  after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued survival of the Workers Party and its fighters on Iraqi lands, and their continued military operations against Turkey will force Iraq to endure the Turkish forces' raids against them under the right to follow up and use the deterrent defense measure to defend itself. This represents a breach by the Turkish side on Iraqi sovereignty and its effect on Iraqi national security. Therefore, the presence of the PKK in the Iraqi scene and its influence mean that it plays a role in the geopolitical interactions of the Iraqi state, which will in turn affect the Iraqi national security

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
Intellectual And Artistic Concepts of The Cultural Context And Their Impact On Contemporary Ceramic Sculpture
...Show More Authors

 The current specialized research tagged (intellectual and artistic concepts of the cultural context and their impact on contemporary ceramic sculpture) paves the way for the emergence of the context in ceramics active in life, so that this relationship will indicate the development and presence of ceramics or not and the volume of its circulation in the joints of the culture of the Arab recipient. As a result, the researcher collected scientific materials to serve the subject of the research in four chapters: Chapter One (General Methodological Framework) To clarify the problem of the research, the importance of the research to achieve benefit in higher education and education for scholars and teachers, while the research aims to revea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 20 2007
Journal Name
Journal Of Planner And Development
The impact of decentralization on regional development
...Show More Authors

As regional development, as a matter of course, poses a number of systemic, scientific and political problems. While the issue of development is primarily at the national level to the limits of World War II in the industrialized world and to the 1960s borders in most Third World countries, the increasing awareness of regional disparities has led to the regional issue Were taken into consideration in the early 1960s and 1970s in most industrialized and developing countries alike. The local issue was only introduced in the early 1980s. The awareness of regional disparities and the fact that the regions do not have the same potential and that some regions have the resources to enable them to develop, grow and develop, unlike other r

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Reflection of knowledge workers characteristics on knowledge acquision “Survey Study of the views of a sample of engineers and technicians in the Directorate of Electricity In the city of Sulaymaniyah
...Show More Authors

Purpose: The research aims to diagnose the current availability of knowledge workers characteristics and the role of these characteristics in knowledge acquision in the city of Sulaimaniya Directorate of Electricity, and to identify the differences between personal and occupational characteristics of a sample of research and its impact on the availability of such properties.

Design/methodology/approach :to achieve the objectives of the research questionnaire was developed especially for it and then distributed to a sample of engineers and technicians working in the Directorate of Electricity city of Sulaimaniya, where the sample of the research (52) respondents.

Findings:  the most important conclusions reached

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Four Women: The E. Cassirer’s Theory and Its Analytical Potential for Understanding Iraqi Symbolic Painting by J. Saleem
...Show More Authors

Based on the theoretical ideas of E. Cassirer, a methodology is developed and an analysis of the painting work by J. Saleem, a representative of modern Iraqi painting, is carried out. While comparing the artistic programme of J. Saleem and the views of E. Cassirer, the methodological potential of the theory of the symbol for the art criticism analysis of the regional painting is clarified. Comparative analysis with the inclusion of the works of B. Buffet, B. Turetsky, J. Miro helps to see the multiple meanings of the same cultural symbol in thematically similar works of different years, created in different socio-cultural circumstances. The article shows that for regions with a shorter history (France, Russia, Spain, etc.), which have lo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Scientific Research In Knowledge
The Impact of Teenage Pregnancy on Maternal, Fetal and Neonatal Outcomes
...Show More Authors

Adolescent pregnancy is common health problem still found in both developed and developing countries; as adolescent may have early sexual practice or early marriage. Adolescent mothers face substantially higher maternal and perinatal morbidity and mortality than adult women. This is a randomized prospective clinical study conducted at Al-Elwiya Maternity Teaching Hospital, Baghdad, Iraq. The objective of this work is to assess the adverse maternal, fetal and neonatal outcomes in early and late teenage pregnant mothers. Study sample consisted of 220 primigravid women with a singleton, cephalic, viable fetus and no congenital abnormality that gave birth at Al-Elwiya Maternity Teaching Hospital, Baghdad, Iraq. The 1stgroup: early teenage (46 w

... Show More
Publication Date
Tue Jan 16 2024
Journal Name
International Journal Of Analysis And Applications
Fear and Hunting Cooperation's Impact on the Eco-Epidemiological Model's Dynamics
...Show More Authors

Due to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2011
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
CAVE DWELLING ANIMALS IN IRAQ PART 2: SYSTEMATIC NOTES ON THE NUTHATCH OF THE FAMILY SITTIDAE (AVESPASSERIFORMES) IN IRAQ WITH ADDING SOME IMPORTANT KNOWLEDGE TO THE NEST BUILDING OF SITTATEPHRONOTA SHARPE, FROM BESAN VALE HAWRAMAN SLOPE, IRAQI KURDISTAN
...Show More Authors

This paper is a review of the genus Sitta in Iraq, Five species of this genus are recognized
Sitta kurdistanica, S. neumayr, S. europaea, S.dresseri and S. tephronota. Geographical
distribution and systematic nots were given for separation and identification, also some notes
on nest building and nest sites of S. tephronota supporting by figures are presented.

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref