Notwithstanding the importance of international cooperation as the other facet of international interactions, a strategy of conflict resolution, a maintainer of international peace and security, its provision in the United Nations conventions, as an objective of the United Nations after the international peace and security, however, the recognition of international cooperation has not been underlined by global, intellectual think tanks. While realism emphasized on the state's role in achieving international cooperation to ensure mutual and multilateral interests, liberalism focused on the role of international organizations in building such cooperation. Additionally, constructivist approaches developed other sub-variables to contribute to the success of the state's attempts at international cooperation strategies, such as identity and social construction of the state.As long as there are conflicting interests, various strengths, different capacities, innovative roles in the world order, nations will keep seeking different patterns of bilateral and multilateral cooperation. Additionally, many countries maintain cooperation with various international representatives to ensure that their interests are realized. Thus, different patterns of cooperation divide nations into cooperative nations, those which maintain contact with international organizations and powers, and non-cooperative nations.There are many non-cooperative countries, particularly those that maintain no contact with the United Nations on several issues. Such non-cooperative countries often cite the rejection of unilateral hegemony over the world order, they are in relevant alliances, or the very nature of these countries' roles in conflicts that underpin them regionally or internationally, as in the case of North Korea. Given these varying patterns of cooperation and alliance, the United Nations, the Security Council, the International Atomic Energy Agency (as an authority in North Korea's nuclear crisis, which poses a direct threat to international peace and security), and the other international actors are obliged to take different techniques of negotiation that vary with respect to phases, talks, and tactics.It is worth mentioning that North Korean nuclear program is a threat to international balances on which East Asia's security, regional stability, and the world order rely. Owing to these considerations, this paper examines international cooperation, draws on theoretical backgrounds to define negotiating strategies, and elaborates on the international tactics taken by the International Atomic Energy Agency, the Security Council, the United States of America, Russia, and China to help resolve North Korea's nuclear program.
In many oil-recovery systems, relative permeabilities (kr) are essential flow factors that affect fluid dispersion and output from petroleum resources. Traditionally, taking rock samples from the reservoir and performing suitable laboratory studies is required to get these crucial reservoir properties. Despite the fact that kr is a function of fluid saturation, it is now well established that pore shape and distribution, absolute permeability, wettability, interfacial tension (IFT), and saturation history all influence kr values. These rock/fluid characteristics vary greatly from one reservoir region to the next, and it would be impossible to make kr measurements in all of them. The unsteady-state approach was used to calculate the relat
... Show MoreThe development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste
... Show MoreFire incidences are classed as catastrophic events, which mean that persons may experience mental distress and trauma. The development of a robotic vehicle specifically designed for fire extinguishing purposes has significant implications, as it not only addresses the issue of fire but also aims to safeguard human lives and minimize the extent of damage caused by indoor fire occurrences. The primary goal of the AFRC is to undergo a metamorphosis, allowing it to operate autonomously as a specialized support vehicle designed exclusively for the task of identifying and extinguishing fires. Researchers have undertaken the tasks of constructing an autonomous vehicle with robotic capabilities, devising a universal algorithm to be employed
... Show MoreDrones are highly autonomous, remote‐controlled platforms capable of performing a variety of tasks in diverse environments. A digital twin (DT) is a virtual replica of a physical system. The integration of DT with drones gives the opportunity to manipulate the drone during a mission. In this paper, the architecture of DT is presented in order to explain how the physical environment can be represented. The techniques via which drones are collecting the necessary information for DT are compared as a next step to introduce the main methods that have been applied in DT progress by drones. The findings of this research indicated that the process of incorporating DTs into drones will result in the advanc
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show More