Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. Meanwhile, sociopolitical values in Israeli society have undergone several changes since 2011, not to mention the continuing conflict with the Palestinians. This study, therefore, aims to elaborate on the concept of national security, differentiate national security from similar concepts, and identify the threats to Israel's national security, represented by challenges arising from actions without states in the Syrian border areas, namely Quneitra, Suwayda and Daraa. Also, this study demystifies the aspects of Israel's strategies to address these challenges after 2011. Thus, this study draws on three key border cities, Quneitra, Swayda, and Daraa, which are vital parts of Syria.
This study dealt with the presentation and documentation of the Iraqi women's participations in athletics in the Arab sports courses since the establishment of the Federation of Athletics in 1948 to 2017 as well as analysis of the results achieved for these participations and discuss the reasons for not participating in some of these courses and the researchers try to show the distinct role of Iraqi athletes, And their active contribution to these courses to represent the country as well as to promote the sports reality of Iraqi women compared to their Arab sisters, whose names have become a symbol of every Arab woman and therefore benefit from the experience of the Arab teams In athletics for women.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreMunicipal solid waste is one of the most important environmental problems in the world and is an important source of environmental pollution and contributes significantly to the pollution of the basic environmental elements of soil, water and air. The management of municipal waste in general is a process of monitoring, collection, treatment or recycling if possible or disposal of waste. This term is used for waste produced by some human activities. States provide this process to mitigate the negative effects of waste on the environment, health and appearance of the city. It is possible to find solutions to the problem of solid waste and make it an important source of income and contribute to securing employment oppor
... Show MoreThe study seeks to identify e-governance requirements in human resources management, which are (administrative requirements, technical, human, financial, and security) which is a new style differs from the traditional management pattern, where work depends on multiple forms and methods of Tools, (e. g. computers and various electronic software), by relying on powerful information systems that help to make management decisions as quickly and less effortless and less expensive to keep up with the tremendous technological advancements in the field of information and communication technology revolution.
The sample included 132 Person who constitute a position (Director General, assistant Director General, section managers and d
... Show MoreThis study aimed to know the concentration of elements content in dairy products. Nine samples collected from the local market in Baghdad, two samples of milk and seven of yoghurt.The results were followed: The ratio of Aluminum In Aluminum cans That is used for storage milk and industrialize yoghurt is about 95.5% ,this ratio is against [1] which said that pureness of Aluminum used in Aluminum cans should not be less than 98-99% . and the ratio of Cadmium reached to 0.001% which is also against [1] which assure that the Aluminum cans should be clean from that element, mean while the concentration of Iron, Copper and Zinc were within the standard level. The highest concentration of Iron was in treatment B2(canon yoghurt)it was 9.95 m
... Show MoreThere is a variety of artificial foot designs variable for use with prosthetic legs . Most of the design can be divided into two classes, articulated and non-articulated feet. one common non-articulated foot is the SACH . The solid ankle cushion heel foot referred to as the SACH foot has a rigid keel .
One key or the key factor in designing a new prosthesis is in the analysis of a patients response .
This view is the most important because if the foot does not provide functional , practical or cosmetically acceptable characteristics the patient will not feel comfortable with the prosthesis , therefore design and manufacturing a new foot is essential, this foot made from polyethylene, its different shape and characte
... Show MoreAbsorption and lifetime measurements were made for C6H6. and C6D6 molecules in pure solid phase and in solid matrices of Ar, N2, CO, and CO2. All measurement are made at low temperatures ranging between 12-50 K. A modified least square fitting deconvolution was utilized to measure the fluorescence lifetime with an error less than 1%. The results show that the use of matrix isolation technique offer a unique environment that minimize the perturbation of the molecular or atomic system and hence facilitate spectral analysis.
This research includes theoretical and evaluation design of a polarizer filter of high transmission in the near IR region of (900-1200nm) for different incidence angles to obtain a long wave and short wave pass filter using analytical calculations. Results refer to a new configuration design in fewer layers than used in previous studies in the long wave pass at incidence angles (45o,50o,55o). Adopted Hafnium dioxide (HfO2) and Magnesium fluoride (MgF2) as coating material at design wavelength (933nm), the study also included design short wave pass polarizer by using the same coating material.
The purpose of this paper is to prove the following result: Let R be a 2-torsion free ring and T: R?R an additive mapping such that T is left (right) Jordan ?-centralizers on R. Then T is a left (right) ?-centralizer of R, if one of the following conditions hold (i) R is a semiprime ring has a commutator which is not a zero divisor . (ii) R is a non commutative prime ring . (iii) R is a commutative semiprime ring, where ? be surjective endomorphism of R . It is also proved that if T(x?y)=T(x)??(y)=?(x)?T(y) for all x, y ? R and ?-centralizers of R coincide under same condition and ?(Z(R)) = Z(R) .