Notwithstanding the importance of international cooperation as the other facet of international interactions, a strategy of conflict resolution, a maintainer of international peace and security, its provision in the United Nations conventions, as an objective of the United Nations after the international peace and security, however, the recognition of international cooperation has not been underlined by global, intellectual think tanks. While realism emphasized on the state's role in achieving international cooperation to ensure mutual and multilateral interests, liberalism focused on the role of international organizations in building such cooperation. Additionally, constructivist approaches developed other sub-variables to contribute to the success of the state's attempts at international cooperation strategies, such as identity and social construction of the state.As long as there are conflicting interests, various strengths, different capacities, innovative roles in the world order, nations will keep seeking different patterns of bilateral and multilateral cooperation. Additionally, many countries maintain cooperation with various international representatives to ensure that their interests are realized. Thus, different patterns of cooperation divide nations into cooperative nations, those which maintain contact with international organizations and powers, and non-cooperative nations.There are many non-cooperative countries, particularly those that maintain no contact with the United Nations on several issues. Such non-cooperative countries often cite the rejection of unilateral hegemony over the world order, they are in relevant alliances, or the very nature of these countries' roles in conflicts that underpin them regionally or internationally, as in the case of North Korea. Given these varying patterns of cooperation and alliance, the United Nations, the Security Council, the International Atomic Energy Agency (as an authority in North Korea's nuclear crisis, which poses a direct threat to international peace and security), and the other international actors are obliged to take different techniques of negotiation that vary with respect to phases, talks, and tactics.It is worth mentioning that North Korean nuclear program is a threat to international balances on which East Asia's security, regional stability, and the world order rely. Owing to these considerations, this paper examines international cooperation, draws on theoretical backgrounds to define negotiating strategies, and elaborates on the international tactics taken by the International Atomic Energy Agency, the Security Council, the United States of America, Russia, and China to help resolve North Korea's nuclear program.
The proposal of nonlinear models is one of the most important methods in time series analysis, which has a wide potential for predicting various phenomena, including physical, engineering and economic, by studying the characteristics of random disturbances in order to arrive at accurate predictions.
In this, the autoregressive model with exogenous variable was built using a threshold as the first method, using two proposed approaches that were used to determine the best cutting point of [the predictability forward (forecasting) and the predictability in the time series (prediction), through the threshold point indicator]. B-J seasonal models are used as a second method based on the principle of the two proposed approaches in dete
... Show MoreSupport vector machines (SVMs) are supervised learning models that analyze data for classification or regression. For classification, SVM is widely used by selecting an optimal hyperplane that separates two classes. SVM has very good accuracy and extremally robust comparing with some other classification methods such as logistics linear regression, random forest, k-nearest neighbor and naïve model. However, working with large datasets can cause many problems such as time-consuming and inefficient results. In this paper, the SVM has been modified by using a stochastic Gradient descent process. The modified method, stochastic gradient descent SVM (SGD-SVM), checked by using two simulation datasets. Since the classification of different ca
... Show MoreAbstract
In this research provide theoretical aspects of one of the most important statistical distributions which it is Lomax, which has many applications in several areas, set of estimation methods was used(MLE,LSE,GWPM) and compare with (RRE) estimation method ,in order to find out best estimation method set of simulation experiment (36) with many replications in order to get mean square error and used it to make compare , simulation experiment contrast with (estimation method, sample size ,value of location and shape parameter) results show that estimation method effected by simulation experiment factors and ability of using other estimation methods such as(Shrinkage, jackknif
... Show MoreThe investment government expenditure is considered the fundamental of enhancing the economic activity as it has become a mean for achieving capital accumulation in all economic sectors, The Iraqi economy is characterized of being yield unilateral depending petroleum revenues as an essential resource of financing government expenditure , as the contribution of petroleum sector in GDP is large in proportions to other economic sectors contribution.
The relationship between investing government expenditure, and non-oil GDP is about to be not existent during the
... Show Moreيعود الأرشيف إلى تورام ايلي التاجر والذي عرف في النصوص أيضا بوكيل التجار(ugula-dam-gàr)، في دوره هذا له سلطة بين التجار في مجتمعه(مجتمع التجار)، يذكر(Garfinkle) أن التجار غالبا ما اكتسبوا ألقابهم عن طريق الوراثة ذلك قد يمنح التجار حق الدخول إلى حسابات المؤسسات العامة. كان تورام ايلي تاجرا نشيطا في أعمال قروض الفضة في أواخر عهود سلالة أور الثالثة(3)، لمدة (ثمان عشرة) سنة أعتبارا من السنة الرابعة من حكم الملك أمارسن وحتى ا
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreThe research included studying a group of eight cuneiform texts dating back to the Old Babylonian era, specifically to the reign of King Larsa Rim-Sin, which were identified through studying the historical versions of these texts. These texts are confiscated, i.e. texts of unknown location, because they did not come through excavations, but rather came to the Iraqi Museum either by people who obtained them through digging, or stolen and smuggled texts that are retrieved by the General Authority for Antiquities; as is the case with our texts that were found smuggled to Jordan and were retrieved by the General Authority for Antiquities.
تعد النصوص المسمارية من اهم الوثائق التي رفدتنا بمعلومات غزيرة عن واقع الحياة اليومية في العصر البابلي القديم المتميز بتطور النشاط الاقتصادي فيه وازدهاره. وتضمن هذا البحث دراسة وتحليل لخمسة نصوص مسمارية اقتصادية غير منشورة وهي من نصوص المتحف العراقي (المصادرة) المجهولة الموقع والمصدر وهي ذات مضامين اقتصادية , ولم نستطع اثبات عائدية النصوص وذلك لانها لاتحمل صيغ تاريخية تشير الى عائدتيها باستثناء النص الا
... Show MoreThe main objective of this study is to determine the suitable excitation wavelengths for
urine components reaching to select the suitable lasers to execute the auto fluorescence due to their
high intensities. The auto fluorescence was measured at 305, 325 and 350 nm excitation wavelengths
for eleven urine samples which were also analyzed by conventional methods (chemical and
microscopic examination). Data manipulation using Matlab package programming language showed
that urine sample with normal chemical and biological components have emission peaks which are
different from the infected urine samples. Despite the complexity of the composition of urine,
fluorescence maxima can be observed. Most likely, the peaks obser