In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle East in favor of their organization. They tried to co-opt the jihad volunteers who traveled to Bosnia after the break-up of Yugoslavia in 1992 after the Bosnian army was able to contain them but ended up expelling them in the fall of 1995. A year later, al-Qaeda achieved greater success in supervising the training of Pakistani fighters who were smuggled into Kashmir to play a combat role In Afghanistan and elsewhere. Al-Qaeda members have also succeeded in excluding local supporters of Kashmir's independence and mixing the cards between national independence,
The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreThe paper deals with claims in construction projects in Iraq and studies their types, causes, impacts, resolution methods and then proposes a management system to control the impacts of claims. Two parts have been done to achieve the research objective (theoretical part and practical part). The findings showed that the main types of the claims are extra work claims, different site condition claims, delay claims and the main causes of the claims are variation of the orders, design errors and omission, delay in payments by owner, variation in quantities and scheduling errors. The claims have bad impacts on the cost by increasing (10% to 25%) and also on the duration of the project by increasing from (25% to 50%).The negotiation is the main
... Show More......
The Iraqi government seeks to overcome the financial crisis by investing and privatizing some projects to achieve sustainable growth. Most of the investment projects in Iraq suffer from many constraints that greatly impact the success of these projects. A survey of the opinions of a group of experts was conducted to identify the most important constraints facing the investment process in Iraq. Then the experts' answers were arranged in a closed questionnaire and distributed to the research sample for which the statistical analysis was conducted. Through it, the most important (17) factors that had the greatest impact on the failure of investment projects in Iraq were reached. One of the main constraints was
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreThe utilization of sugarcane molasses (SCM), a byproduct of sugar refining, offers a promising bio-based alternative to conventional chemical admixtures in cementitious systems. This study investigates the effects of SCM at five dosage levels, 0.25%, 0.50%, 0.75%, 1.00%, and 1.25% by weight of cement, on cement mortar performance across fresh, mechanical, thermal, durability, and density criteria. A comprehensive experimental methodology was employed, including flow table testing, compressive strength (7, 14, and 28 days) and flexural strength measurements, embedded thermal sensors for real-time hydration monitoring, water absorption and chloride ion penetration tests, as well as 28-day density determination. Results revealed clear
... Show More يهدف البحث إلى تحضير سلسلة جديدة من معقدات العناصر الانتقالية ثنائية التكافؤ (الكوبلت, النيكل, النحاس, الخارصين ,الكادميوم والزئبق) مع المركبات الحلقية غير المتجانسة (L1) و(L2) والمشتقة من تفاعل 2,1- فينيلين ثنائي امين وسايكلوهكسان -2,1-ثنائي امين مع المركب الوسطي (Pr) على التوالي. شخصت المعقدات ذات الصيغة العامة :- [M(L1or L2)Cl2] بواسطة طيف الرنين النووي المغناطيسي البروتوني والكربوني وقيا
... Show MoreBackground: One of the major problems in endodontics is micro-leakage of root canal fillings which might contribute to the failure of endodontic treatment. To avoid this problem, a variety of sealers have been tested. The objective of this, in vitro, study was to evaluate the shear bond strength of four resin based sealers (AH plus, silver free AH26, RealSeal SE and Perma Evolution permanent root canal filling material) to dentin. Materials and Methods: Forty non-carious extracted lower premolars were used. The 2mm of the occlusal surfaces of teeth were sectioned, to expose the dentin surface. The exposed dentin surfaces of teeth were washed with 5ml of 2.5% NaOCl solution followed by 5ml of 17 % EDTA then rinsed by deionized water to remov
... Show More
There is a theoretical controversy in the books of Usul al-Fiqh, in the past and the present, about whether the ruling should be attached to its reason (al-Hikmah), or its apparent and stable cause (al-Illah). Looking at the practical cases of the jurists, we found them sometimes attaching rulings to its reason, and sometimes to its cause, so there is a need to know the factors that affect their choices. By extrapolation, the researcher reached at nine factors that affect referring the ruling to its cause or to its reason in jurisprudential cases.
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.