Roaming data is an important source of information about the political and social activities of a country. And this is true for Iraq situation after 2003 when the mobile companies started their business. In this paper, data of subscribers roamed onto foreign networks (inbound roamers) is collected; it consists of the name of the Radio Control Point, the counter dealing with this type of information, Mobile Network Code/Mobile Country Code tupel. This data is processed. Results obtained out of this process show the classification of the inbound roamers (according to their countries) during the occupation period (2008-2009). These results reflect the political situation of Iraq at that time. Information resulted from this process is useful for people who make decisions. Acknowledgment: the data handled in this report is a real data belong to the former Iraqna mobile company who worked in Iraq between 2003-2009. Attempts to get new data from Zain and Asiacell have failed and this is documented with my college.
This work was included external morphological study of horse fly Tabanus indrae Hauser 1939 new record in Iraq, which belongs to family: Tabanidae order: Diptera. The study was involved the most important taxonomic external characters of the: head, thorax, abdomen and their appendages which are: antenna, maxillary palp, wings, legs, spotting in coloring pattern and female genitalia of abdomen
This paper aimed to test random walking through the ISX60 market index for the ability to judge market efficiency at a weak level. The study used Serial Correlation Test, the Runs Test, the Variance Ratio Test, as well as the Rescaled Range Test.The population of the study represents of Iraq Stock Exchange. The study concluded accepting the hypothesis of the study that the returns of the ISX60 market index in the Iraqi market for securities does not follow the random walking in general and as a result the Iraq market for securities is inefficient within the weak level of efficiency and the study recommended need a supervisors work in the Iraqi market for securities to activate all means a which will work to communication with information
... Show MoreHarriet Jacobs was a writer and a reformer. As a female writer in the nineteenth century, Jacobs wrote her narrative as a means of resisting the system of slavery. She wrote her book Incidents in the Life of a Slave Girl: Written by Herself, (1842) to reflect upon the exploitation of the black people and the need to change the hierarchal attitude that governs white/black relations. She was engaged in many abolitionist events and her anti-slavery approach appeared clearly in her writings. She shares Du Bios ideas about freedom and emancipation and the need for a political and cultural change. Thus, Du Bois’s theory provides a framework for her autobiographical novel where she portrays Linda Brent, the main character, a strong w
... Show MoreHarriet Jacobs was a writer and a reformer. As a female writer in the nineteenth century, Jacobs wrote her narrative as a means of resisting the system of slavery. She wrote her book Incidents in the Life of a Slave Girl: Written by Herself, (1842) to reflect upon the exploitation of the black people and the need to change the hierarchal attitude that governs white/black relations. She was engaged in many abolitionist events and her anti-slavery approach appeared clearly in her writings. She shares Du Bios ideas about freedom and emancipation and the need for a political and cultural change. Thus, Du Bois’s theory provides a framework for her autobiographical novel where she portrays Linda Brent, the main character, a strong wille
... Show MoreBackground: Nutritional status during childhood is very important for individual development and growth. Nutrition has local and systemic effect on the oral health by affecting dental health and salivary composition. This study was aimed to determine effect of iron, sodium and potassium ions in saliva on the nutritional status and to determine the effect of nutritional status on caries severity among preschool children. Material and Methods: The sample consists of 90 children aged 4 and 5 years of both genders, selected from 6 kindergartens in Al-Resafa aspect of Baghdad province. Children classified according to their nutritional status into three groups (normalweight, underweight and overweight). Nutritional status was determined by usi
... Show MoreAbstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreThis paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show More