The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.
اليات منع الحرب الاهلية
This research aims to introduce the importance of electronic marketing and the extent of its impact on the quality of the insurance service in general, and the national insurance company in particular, and the advantages it can achieve, an increase in its competitiveness, as well as contributing to increasing the efficiency of the performance of the insurance company.
The research relied on the questionnaire form as a main tool for obtaining data and information by the 70 questionnaire questionnaires required for the field side of the research, as they were distributed and retrieved in full, and all of them are suitable for analysis. The sample .The questionnaire was designed with three axes, the first wa
... Show MoreTransparency considered being one of the modern administrational terms which started to be largely used in the last period, because of its political, economical, social and cultural dimensions. As well as, its administrational dimension that helps to create a work environment marked by order and flawless from wrong practices and Transparency provides credibility to the sides that pursue it in their practices, till it became a mean of distinction. The choice of the subject of the research ((Transparency and its effect on Level of Job satisfactions of Workers in General Insurance company)), which aims to measure the effect of Transparency in Level of Job satisfactions of Workers in Insurance company. Came in the time when many countries te
... Show MoreTime series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ
... Show MoreThe problem of informal settlements in Iraqi is one of the most serious problems due
to its economic, social and security impacts which jeopardize the society safety and stability.
This study investigates the present situation of informal settlements in the Baghdad
governorates as well as approaches followed in making decisions to either upgrade or remove
those areas. Requirements of each decision are also discussed.
Study methods relied on both office and field studies to collect data and information
needed. The study revealed important findings that would help take appropriate measures that
deal with the informal settlements in Iraqi. The study also proposes effective mechanisms to
preclude both an increase in c
Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their b
... Show MoreCrime is one of the most severe challenges facing States, and strives to find preventive measures, reduce its seriousness, and prevent them; due to developments, crimes have increased, and emerging new patterns of crimes, there is an urgent need to prevent crimes and reduce their effects. Modernizing its punitive system and diverting it to correctional rehabilitative justice to redress the prejudice caused by the crime and rehabilitate the convicted person by using alternative measures to short-term imprisonment. This research emphasizes alternative sanctions' value to minimizing short-term imprisonment penalties and their impact on societal security through several goals like, the negative consequences, justifications, and alternatives
... Show Moreلغرض تقصي وضع الطفولة في العراق كان لابد من إستعمال أدوات وأساليب إحصائية تعنى بتفسير العلاقات السببية وإتجاه تأثيراتها مع إستعمال أسلوب تصنيف للمؤثرات (المتغيرات) المهمة لرسم صورة أوضح للظاهر قيد الدراسة بحيث تكون مفيدة من خلال إستثمارها وتحديثها وتطويرها في الدراسات السكانية المستقبلية. ولذا تم استعمال أسلوبين من الأدوات الإحصائية في مجال تحليل البيانات متعدد المتغيرات وهو التحليل العنقودي والتحلي
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show More