Interested in this research shed light on the reality of foreign trade to Iraq Who suffers from a marked deterioration due to poor economic diversification of the country And increase the degree of economic exposure , Which creates a state of extreme caution towards the question of accession to the (WTO) , As controls Iraq's foreign trade commodity , a president of one oil As well as the contribution of this item , and by a large formation in GDP , And that such a large and dangerous decline in the degree of economic diversification will create negative effects On overall economic activity components , As the scarcity of commodity products will inevitably lead To weakness in the domestic market's ability to meet the domestic demand , Which will open the door to imports of goods to invade this market , Supported in financing the movement of such imports Are being provided by oil exports of financial revenues As a result of that process will be generated negative impact on the trade balance of the country And the value of local currency As well as direct effects on cash reserves of hard currency held by Country , These structural imbalances in Iraq's foreign trade requires On the Iraqi economy and the current wait own reality on the subject of accession to the World Organization , Because joining lead to damage in the economic activity in the physical potential Because of the lack of a local product , whether industrial or agricultural competitor for foreign products , Which will lead to a lack of hope in the revival of the domestic industry and the advancement of the agricultural sector , The potential industrial and agricultural sector is not commensurate with their counterparts in the economies of the countries Members of the acceding which will not qualify for entry in the successful competition with the products of these countries , And also lead to join the organization continued exposure economy with a high degree on the outside and a lot of other negatives and the damage that will cause the Iraqi economy .
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreIncreasing need for our youth to effective dialogue at the present time, due to the nature of the era in which live, as it abounded risk of intellectual and cultural invasion.Moreover, the need to ensure that the dialogue between the members of the community to confront the many issues of contemporary society in various fields, politically, socially and economically, culturally and religiouslyThe absence of effective dialogue, or the consequent rejection of many of the negative aspects of social and cultural Kaezzlh coup and inertia and ignore the mental capacity of some non-existent among others.The importance of effective dialogue in being the most important foundations of social life a
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
The aim of the study was to identify the nutritional awareness of middle school students and its relation to some variables of the sample of the research according to the gender variable (male and female), the variable type of family and the variable achievement of the parents.
The descriptive approach was adopted and the sample of the study consisted of (795) male and female students who were selected by the random stratified method. The research tool was prepared based on the literature and previous studies. The food awareness measure in its final form was (25) after the data collection was processed using the appropriate statistical met
... Show MoreGod, may He be glorified and exalted be He, has given every human being the right to life and a dignified life, and has warned against transgression against any of its sanctities without a legitimate right. No one, regardless of his status or authority, can deprive a person of his rights that the Sharia came to preserve, and whoever does that has declared all people to war, as all humanity is in solidarity. In raising the hand that is simplified to harm a person and oppress him unjustly and exalted in the land.
If this is the case, the Sharia came to establish the right of people, groups and individuals, to defend their sanctities, preserve their security, recover their usurped rights, repel the aggression of the aggressors, and oppre