The Battle of Kadesh is replete with many military arrangements that reflect the tremendous development of war preparations in the thirteenth century BC; where the expressive pictures the Egyptians left on some of the walls of their temples show the tremendous ability to organize and divide the forces and the great development that affected the war machine. Furthermore, the text accompanied these pictures reveal some news about that battle, which is considered one of the most important wars in the ancient world. Thus, the importance of the study lies in the fact that it examines one of the most important battles of the ancient Near East, the results of which had great repercussions on the region. This is because it is the most abundant B
... Show MoreMassive multiple-input multiple-output (MaMi) systems have attracted much research attention during the last few years. This is because MaMi systems are able to achieve a remarkable improvement in data rate and thus meet the immensely ongoing traffic demands required by the future wireless networks. To date, the downlink training sequence (DTS) for the frequency division duplex (FDD) MaMi communications systems have been designed based on the idealistic assumption of white noise environments. However, it is essential and more practical to consider the colored noise environments when designing an efficient DTS for channel estimation. To this end, this paper proposes a new DTS design by exploring the joint use of spatial channel and n
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreSocietal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreNano-crystalline iron oxide nanoparticles (magnetite) was synthesized by open vessel ageing process. The iron chloride solution was prepared by mixing deionized water and iron chloride tetrahydrate. The product was characterized by X-Ray, Surface area and pore volume by Brunauer-Emmet-Teller, Atomic Force Microscope (AFM) and Fourier Transform Infrared Spectroscopy(FTIR) . The results showed that the XRD in compatibility of the prepared iron oxide (magnetite) with the general structure of standard iron oxide, and in Fourier Transform Infrared Spectroscopy, it is strong crests in 586 bands, because of the expansion vibration manner related to the metal oxygen absorption band (Fe–O bonds in the crystals of iron ox
... Show MoreThe aim of this study was to investigate antibiotic amoxicillin removal from synthetic pharmaceutical wastewater. Titanium dioxide (TiO2) was used in photocatalysis treatment method under natural solar irradiation in a tubular reactor. The photocatalytic removal efficiency was evaluated by the reduction in amoxicillin concentration. The effects of antibiotics concentration, TiO2 dose, irradiation time and the effect of pH were studied. The optimum conditions were found to be irradiation time 5 hr, catalyst dosage 0.6 g/L, flow rate 1 L/min and pH 5. The photocatalytic treatment was able to destruct the amoxicillin in 5 hr and induced an amoxicillin reduction of about 10% with 141.8 kJ/L accumulate
... Show MoreThe laboratory experiment was conducted in the laboratories of the Musayyib Bridge Company for Molecular Analyzes in the year 2021-2022 to study the molecular analysis of the inbreed lines and their hybrids F1 to estimate the genetic variation at the level of DNA shown by the selected pure inbreed lines and the resulting hybrids F1 of the flowering gene. Five pure inbreed lines of maize were selected (ZA17WR) Late, ZM74, Late, ZM19, Early ZM49WZ (Zi17WZ, Late, ZM49W3E) and their resulting hybrids, according to the study objective, from fifteen different inbreed lines with flowering time. The five inbreed lines were planted for four seasons (spring and fall 2019) and (spring and fall 2