The research article deals with the process of building or rebuilding the state in Iraq after 2003 in its various dimensions, in light of the vision and foundational procedures that were developed and supervised by the United States in cooperation with the new leaders of Iraq based on the mechanism of sectarianethnic representation, and diagnosing the imbalances that arose out of that vision and the accompanying procedures, which led to the emergence of new variables in the political process, especially in the post-ISIS* phase, which produced important challenges to the political system and the Iraqi state. The political dynamics and balances emerging after ISIS* represented at the same time opportunities and risks in the process of building the Iraqi state, as opportunities arose to transcend the identity policies adopted by the political system, and address the failures of the political process, and thus strengthen the path of state building, but the risks of those transformations seeking reform may push towards more state fragility, given the weakness of the political administration of the system in the face of the complexities of the political environment and its effects that were rooted in the p olitical system.
The present paper examines the genre of death notices in Iraqi newspapers in terms of its schematic and socio-cultural structure. Adopting Swales' [1990] rhetorical approach to genre analysis, the study has examined a corpus of 150 death texts
Bioavailability is the objective for an optimum formulation. The target of the analysis is to maximize both the fluidity and disintegration profile of class II weakly compounds that are water-soluble. Anti-dyslipidemia drug rosuvastatin calcium (RC) (bioavailability 20%) through formulating as nanofibers (NFs) using electrospinning (ES) technology. Twenty formulas were prepared, and different polymers and polymer combinations with various concentrations were used such as polyethylene oxide (PEO) polyvinyl pyrrolidine (PVPK-30), and hydroxypropyl methylcellulose (HPMC). Three distinct groups of maximum parameters, including polymeric solution, electrospinning method, and ambient parameter, are capable of influencing the creation alon
... Show MoreDBNRAAK Mohammed, International Journal of Research in Social Sciences and Humanities, 2020
BN Rashid…, Special Education, 2022
Bladder cancer (BC) is the predominant malignant neoplasm in the urinary system and ranks as the tenth most prevalent malignant tumor worldwide. Compared with females, males displayed a four-fold more common incidence of bladder cancer. It mainly affects men. Bladder cancer is the fourth most prevalent neoplasm in males. The most important protein that makes up high density lipoprotein (HDL), ApoA-I apolipoprotein A1 is essential in regulating the right amount of cholesterol. Multiple inquiries have demonstrated that APOA1 plays a pivotal role in the progression, infiltration, and spread of tumors. Objectives. The objective of this study was to measure the level of urine to serum apolipoprotein A1 in patients suffering from bladder
... Show MoreIn This paper, we have been approximated Grűnwald-Letnikov Derivative of a function having m continuous derivatives by Bernstein Chlodowsky polynomials with proving its best approximation. As well as we have been solved Bagley-Torvik equation and Fokker–Planck equation where the derivative is in Grűnwald-Letnikov sense.
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show More