تعد ظاهرة الارهاب المتزايدة في العالم من اخطر اشكال التهديدات الامنية التي تواجة الدول لانها تستهدف في جانب مهم منها امن واستقرارومستقبل مجتمعاتها لاسيما اذا جمع الفعل الارهابي بين مطامع واهداف القوى الخارجية التي لا تريد استخدام ادواتها المباشرة وانما بالاعتماد على محركات في خلق الازمات داخل الدول المستهدفة او استغلال حدودها او الظروف السياسية المحيطة او في احيان اخرى تفرق في لحمة ونسيج المجتمع داخل تلك الدوله وقد يشجع فئة من فئاتة الى سلوك يلحق الضرر في المجتمع مما يهدد سلامتة بما في ذلك استخدام العنف وصولا لتحقيق اهداف سياسية او مصالح فئويه قد تنعكس في جانب منها خدمة لاطراف خارجية اقليمية او دولية.
In this work, a joint quadrature for numerical solution of the double integral is presented. This method is based on combining two rules of the same precision level to form a higher level of precision. Numerical results of the present method with a lower level of precision are presented and compared with those performed by the existing high-precision Gauss-Legendre five-point rule in two variables, which has the same functional evaluation. The efficiency of the proposed method is justified with numerical examples. From an application point of view, the determination of the center of gravity is a special consideration for the present scheme. Convergence analysis is demonstrated to validate the current method.
Breast cancer is the most prevalent malignancy among women worldwide, in Iraq it ranks the first among the population and the leading cause of cancer related female mortality. This study is designed to investigate the correlations between serum and tissue markers in order to clarify their role in progression or regression breast cancer. Tumor Markers are groups of substances, mainly proteins, produced from cancer cell or from other cells in the body in response to tumor. The study was carried out from April 2018 to April 2019 with total number of 60 breast cancer women. The blood samples were collected from breast cancer women in postoperative and pretherapeutic who attended teaching oncology hospital of the medical city in Baghdad and
... Show MoreRenewable energy technology is growing fast especially photovoltaic (PV) system to move the conventional electricity generation and distribution towards smart grid. However, similar to monthly electricity bill, the PV energy producers can only monitor their energy PV generation once a month. Any malfuntion in PV system components may reduce the performance of the system without notice. Thus, developing a real-time monitoring system of PV production is very crucial for early detection. In addition, electricity consumption is also important to be monitored more frequently to increase energy savings awareness among consumers. Hardware based Internet-of-Thing (IoT) monitoring and control system is widely used. However, the implementation of
... Show MoreThe best proximity point is a generalization of a fixed point that is beneficial when the contraction map is not a self-map. On other hand, best approximation theorems offer an approximate solution to the fixed point equation . It is used to solve the problem in order to come up with a good approximation. This paper's main purpose is to introduce new types of proximal contraction for nonself mappings in fuzzy normed space and then proved the best proximity point theorem for these mappings. At first, the definition of fuzzy normed space is given. Then the notions of the best proximity point and - proximal admissible in the context of fuzzy normed space are presented. The notion of α ̃–ψ ̃- proximal contractive mapping is introduced.
... Show MoreNowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThis study aims to find out the effectiveness of instructional scaffolding strategy in the development of academic achievement and critical thinking of female second grade secondary mathematics students. Semi-experimental and relational descriptive method was used. The sample of the study consisted of (50) students divided into an experimental group and a control group. The experimental group was taught using scaffolding strategy whereas the control group was taught using traditional method. Pre- and Post-tests were used to achieve the objective of the study. The results of the study revealed that there are statistically significant differences in the mean scores of the experimental and control groups in the posttest for both the academi
... Show MoreIn the analysis of multiple linear regression, the problem of multicollinearity and auto-correlation drew the attention of many researchers, and given the appearance of these two problems together and their bad effect on the estimation, some of the researchers found new methods to address these two problems together at the same time. In this research a comparison for the performance of the Principal Components Two Parameter estimator (PCTP) and The (r-k) class estimator and the r-(k,d) class estimator by conducting a simulation study and through the results and under the mean square error (MSE) criterion to find the best way to address the two problems together. The results showed that the r-(k,d) class estimator is the best esti
... Show MoreAbstract
The present research paper provides an analysis of Thomas Dekker’s
exaltation of the figure of the Babylonian woman as a tragic heroine in his dramatic
art. The paper falls into two sections. The first section outlines the deliberate
mispresentation of the figure of the Babylonian woman in the Bible and the
misreading of that figure. The second section reveals Dekker’s rectification of the
distorted image of the Babylonian woman, whom he defends and glorifies as a
heroine and a victim of misinterpretation and conspiracy.