The implementation of decentralization in Iraq was asymmetrical, leading to different forms and paces of implementation. Comparing four cases of Basra, Kirkuk, Nineveh, and Sulaymaniyah indicate that these cases differ in their political stability and autonomy in a way that led to a different forms of decentralization. This paper argues that the higher the level of political autonomy from the federal government, the more efficient the governance model, and the more efficient the governance model, the more legitimate the system (trust), and the more legitimate a system, the more accountable elected officials. Therefore, it recommends reforming the institutional setup of decentralization by having districts, instead of provinces, as the building block of decentralization.
يهدف البحث الحالي الى معرفة أثر انموذج بوسنرفي تحصيل مادة الرياضيات لدى طلاب الصف الثاني المتوسط .
ولتحقيق هدف البحث صاغت الباحثة الفرضية الآتية :
لا يوجد فرق ذو دلالة إحصائية عند مستوى (0,05) بين متوسط درجات طلاب المجموعة التجريبية الذين درسوا مادة الرياضيات وفق انموذج بوسنر، وبين متوسط درجات طلاب المجموعة الضابطة الذين درسوا المادة نفسها بالطريقة الاعتيادية في اخت
... Show MoreThe Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods.
The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for
... Show Moreمن اهداف بعض التجارب هي معرفة تاثير التسلسلات المختلفة لبعض الادوية او التغذية او تجارب التعلم. وفي بعض الاحيان قد تكون الوحدات التجريبية نادرة لهذا نقوم باستخدام الوحدات التجريبية على نحو متكرر. او بسبب الميزانية المحدودة فان صاحب التجربة يخضع كل وحدة تجريبية لاختبارات عديدة ويطلق على هذا النوع من التجارب التي يتم فيها استخدام الوحدات التجريبية (الاشخاص) Subject على نحو متكرر
... Show Moreالتسليات في البلدان الاسلامية مشاهد حياة الطرب والالات الموسيقية كما يعكسها الفن
The reasons for the totality are varied and multiple, some of which are attributed to the methods of the Arabic language as the participant
Verbal and omnipotent differences in the oud of conscience, which are comprehensive reasons for language in all
And some of these reasons are due to the sciences of the Qur'an, such as cessation and initiation
The explanation of the explanation for the multiplicity of words and differences in them, which necessarily led to a dispute jurisprudence
Linked to the origin of disagreement in the interpretation of the totality and its orientation and understanding and to summarize this subject and diverge
Parts and vocabulary did not receive the necessary care and did not absorb the lesson an
Gingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreBarium–doped TiO2 / n-Si photodetector was fabricated by spray pyrolysis exhibited visible enhancement responsivity profile with peak response at 600 nm flat response between 650 and 900 nm. The quantum efficiency was 30% and specific detectivity was 5x1012 W-1Hz1/2cm at peak response. The GaAlAs laser diode was used to estimate the rise time of the detector.
Find aimed to reveal the teaching practices of the teaching faculties of education departments of the University of Baghdad in the light of the motives of learning from the perspective of students . Researcher selected the research community in a deliberate humanitarian sections of students and faculties of education for girls and IbnRushd . Ed reached basic research sample ( 400 ) students were numbers search tool questionnaire , and included (30) paragraph . In processors statistical data , use the weighted average and the weight percentile , results have shown that it is more paragraphs which received wide acceptance from the viewpoint of students ( do not make fun of the students' answers wrong but corrects and discussed with them )
... Show Moreمجتمع مدني ام مجتمع اهلي ؟ دراسة لواقع المجتمع المدني في البلدان العربية