Preferred Language
Articles
/
uhfInpIBVTCNdQwCprqM
Political structure and the administration of political system in Iraq (post-ISIS)
...Show More Authors

The objective of the investigation was to analyze the structure and administration of the political system in Iraq (post-ISIS). After 2003, the Iraqi political system suffered the fundamental problem of its failure to achieve the political and social inclusion that characterizes democratic systems, to guarantee the establishment of a "state for all", while respecting differences. Political representation has moved from the system of sectarian ethnic components, under the title of consensual democracy, to the representation of leaders and the realization of their interests and the interests of their parties at the expense of the groups that claim to represent them, which complicates the problem. In this sense, the new political system could not represent social pluralism, on the one hand, and could not satisfy the demands of the same components on the other. Methodologically, it is a political investigation in the framework of the analysis of the political system. It was concluded that the search for new balances is a pending issue. While these emerging balances and arrangements are still fragile and immature to the extent required, they represent a clear entry point to reshape the regime's political structure in one form or another.

Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Renewable energy (solar energy) and its potential for electricity generation in Iraq
...Show More Authors

The world's renewable energy sources have taken on great importance, for its cleanness and its environmental effects as well as being a renewable source, Increased demand for fossil energy sources is also causing global warming and climate change. Iraq is an appropriate area for renewable energy This study shows that renewable alternative energy has not been used sufficiently enough at present. But this energy can play an important role in the future of renewable energy in Iraq. This research aims to study the renewable energy in Iraq (solar energy) and it is appropriate to develop this alternative energy for crude oil, which is characterized by the use of the most appropriate and less economical and more environmentally friendly. Solar

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Energy and Exergy Analysis on Modified Closed Wet Cooling Tower in Iraq
...Show More Authors

The present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Traditional and molecular methods for diagnosing bacterial meningitis in Erbil city, Iraq
...Show More Authors

Bacterial meningitis is a leading cause of illness and death worldwide. It is crucial for clinical and public health care, as well as disease control, to identify the meningitis-causing agent promptly. Between June 2021-February 2022, a total of 100 cerebrospinal fluid (CSF) and blood samples were collected from suspected cases of meningitis admitted to Raparin Paediatric Teaching Hospital, Erbil city-Iraq. Cytochemical, cultural, and biochemical tests were conducted, and confirmed by molecular techniques. Bacterial culture findings were positive in 7% of CSF samples and just one positive among blood samples. The most common pathogens found by cultural characteristics and VITEK 2 Compact System were Staphylococcus sciuri in two

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Economics And Administrative Sciences
Estimating Demand for Imported Food Categories in Iraq
...Show More Authors

Iraq is highly dependent on international markets to provide food for its residents. As imported food prices are highly dependent on crude oil prices in global markets, any shock in oil prices will have an impact on food consumption in the country. As a result, it is essential to study the demand for imported food at every time period. To the best of our knowledge as researchers, as not even a single study is available in the literature, this paper is considered the first to study the demand for imported food groups in Iraq. Therefore, the main objective of this research is to estimate demand elasticities for several imported food categories in Iraq. This study uses an Almost Ideal Demand System model to analyze the demand for imported f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Tue Feb 27 2024
Journal Name
Tem Journal
Supervised Classification Accuracy Assessment Using Remote Sensing and Geographic Information System
...Show More Authors

Assessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Aug 01 2014
Journal Name
International Journal Of Engineering And Innovative Technology (ijeit)
New Predictive Block Matching Searching Algorithms and Hybrid Predictive Search System
...Show More Authors

In this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Design and Implementation ofICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref