The developing countries, like our country Iraq suffer from deep comprehensive structural crisis, manifestations and a clear imbalance between the demand and the supply sides. The overall imbalance in the external balance. As a consequence, this caused the accumulation of foreign debts or failure in the implementation of economic development programs. The countries which are forced to resort to the International Monitoring Funds, and the World Bank for assistance and to express an opinion on policies that include restrictions controls that belong to the monetary, and fiscal side group, imposed on the economies crisis, as a condition for returning to normal which called reform programs. The organize of the events of radical changes in the economic structure towards the rule of the free market system trends in the domestic and international economic activity, carried out by the top financial institutions in the country like the Central Bank, for example, in order to improve the complete level of demand commensurate, with the full level of supply and return to the state of economic balance. The structural adjustment programs, that represents the advanced phase of the restoration of capitalism in which direct changes in agreement with those of international institutions, and under strict supervision conducted restructuring process. The structural adjustment policies programs, or called the government programs, as a prelude to conclude agreements on debt rescheduling, or as a kind of show good intentions and behavior begins her request.The standard requirements for the procedures of the International Monetary Fund, including application procedures for government authorities for tax, and financial sector reform, restructuring state-owned enterprises, and macroeconomic stability.
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreBiodiversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity (by developmental factors) environmental factors and environmental factors environmental factors and environmental factors and environmental factors Correlation between biology and the succession of geological and historical factors of living organisms and geological and historical factors to the site and what It is surrounded by natural and tourist attractions and the pursuit of scientific methods in order to advance the studies of biological diversity in the region .
Conflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s
... Show MoreA total 474 argasid ticks removed from 617 hosts including bats, rodents, and birds were found belong to four species of the genus Argos. One of which A. reflexus is reported for the first time for Iraq. Some informations regarding the infestation rate, intensity and some biological data are provided.
The incorporation of safety characteristics into the traditional pavement structural design or in the functional evaluation of pavement condition has not been established yet. The design has focused on the structural capacity of the roadway so that the pavement can withstand specific level of repetitive loading over the design life. On the other hand, the surface texture condition was neither included in the AASHTO design procedure nor in the present serviceability index measurements.
The pavement surface course should provide adequate levels of friction and ride quality and maintain low levels of noise and roughness. Many transportation departments perform routine skid resistant testing, the type of equipment us
... Show MoreNosocomial infections are one of the most important causes of mortality and morbidity in hospitals. These are major public health problems worldwide, but particularly in developing countries. The purpose of this research was to analyze the frequency of the microorganisms in the specimens taken from the surgical wounds, and to examine antimicrobial susceptibility for some isolates . Wound swabs were examined from June 2010 to January 2011. The isolates were identified by conventional methods, antimicrobial susceptibility testing was performed by Kirby-Bauer disc diffusion method as per NCCLS guidelines.A total of 102 wound swabs were examined 22(21.56%) swabs were sterile and 80(78.43%) were positive for microorganisms. The results showed
... Show MoreTeresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce
... Show MoreIt was not coincidene that much talk about intertxtuality prescription phenomenon tzms the creative process but have directed their tracks beyond the litery taxs prior or contemporaneous as the mechanics of in tertexuality able to contain all the pattems of expression in literary texts and fee structures ofher text copable of understanding and in terpretaion especially as the phenomenon of in twrtexuality actually depends on the existence of Understanding and interpretation, especially as the phenomenon of intertextuality actually depends on the existence of systems indicative independent but carries processes rebuild text templates one way or another are included in the templates and visions of other intellectual, Mstmjh languages cultu
... Show MoreThe aim of this study is to examine the noun phrases used in Nacati Bey's divan. In this study, we have discussed all kinds of phrases including Arabic and Persian compositions. Because at that time the use of Arabic and Persian compounds was very common.
In the introduction, I briefly discussed some of Necati's life. I have benefited from valuable resources. Among these, Zeynep Korkmaz, Muharrem Ergin, Fuat Bozkurt and others.
In this study, I have dealt with the subject and type of noun phrases in detail and one by one. In this divan, Persian and Arabic noun phrases are also included. We have been mentioned and explained in this study.