Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to uncertainty about the intentions of the rising power in the region, which is important to China. China has many memories of Japan's militarization from World War I, World War II, and beyond, when Japan became the cornerstone of the U.S. containment strategy for popular China in 1949. Therefore, this study aims to define cyber power, regional conflict management strategies, and cyber power pillars in general. The study also elaborates on the Chinese strategies used in cyber actions in its conflict with Japan after 2017.
Project deal with the study of the suitability of the planning standards of the select sites for sports facilities for the holy city of Karbala and the extent of convergence and divergence between these standards and points of strength and weakness in each of these standards.
It was found that there was a lack of the role given to the sports as a kind of luxury does not deserve to spend money and efforts, and was then incorporated with a lot of entertainment services by planners.
أعلى النموذج
<
... Show MoreOne of the rules concerning the control of civil transactions is the rule of no harm and harm, which was enacted by our Holy Prophet Muhammad (peace be upon him and his family). Scholars singled it out by research and investigation, and classified by non-scientists independent messages, showing the status of al-Qaeda in terms of its perception, meaning, branches and results, and the importance of this rule in the payment of damage and compensation for it has been provided by the Iraqi legislator generous within the provisions of Iraqi law in all its branches of public and private, as applied The judiciary Iraq The provisions of this rule have been issued and numerous decisions have been made to compensate for the damage and to give to ev
... Show MoreBreast cancer is the most repeatedly detected cancer category and the second reason cause of cancer-linked deaths among women worldwide. Tumor bio-indictor is a term utilized to describe possible indicators for carcinoma diagnosis, development and progression. The goal of this study is to evaluate part of some cytokines and biomarkers for both serum and saliva samples in breast cancer then estimate their potential value in the early diagnosis of breast cancer by doing more researches in saliva, and utilizing saliva instead of blood (serum and plasma) in sample collection from patients. Serum and salivary samples were taken from 72 patients with breast cancer and 45 healthy controls, in order to investigate the following
... Show Moreدراسة القدرات النووية الإيرانية وابعادها الدولية والإقليمية
The Significance of this research comes as a result of the development occurring in various life fields including the field of technical and technological development in the domain of industrial products which are in direct touch with the receiver, and because the study of deletion and addition mechanism didn't Find the Scientific space through researches and Studies. On this basis , the aim of this study is defining the forms of deletion and addition mechanism in designing the industrial product in a way that fits the functional presser . As to the limitations of this study, they involve examples of readymade Turkish House furniture, which is available in Iraqi local markets in Baghdad city 2013. The study included four chapters. The fi
... Show MoreThe researcher chose her research which is imprinted ( the mechanism of employing the numbered personality in structuring scientific imaginary movies) because it’s found in modern employing of the numbered personalities of the movies that are designed by computers which made the directors and the producers to exploit these numbered development technologies in designing numbered personalities, in order to make them heroes instead of the actual actors in the cinema scene, it’s divided the research to five chapters, the first chapter, the methodical fine which includes, the problem of the research, the aim of the research includes, the importance of the research and it’s details, and the chapter concludes limiting the important terms,
... Show MoreBackground: Gingival crevice fluid (GCF) is a mixture of substances derived from serum, leukocytes, and structural cells of periodontium and oral bacteria. These substances possess a great potential for serving as indicators of periodontal disease and healing after therapy the main purpose of this study was to find if there is a difference in albumin concentration between healthy and diseased periodontal tissues and to compare between diseased group according to pocket depth Materials and methods: total sample composed of 60 pockets found in 35 patients all of them had no history of any systemic disease, The samples were divided in to three main group that include two diseased groups divided according to the depth of the periodontal pocket
... Show MoreTechnological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,
... Show MoreControlling public expenditures is one of the main objectives of the public budget. The public budget often suffers from a deficit, whether in developed or developing countries, because expenditures are usually greater than the revenues generated. This requires the existence of financial rules that are adhered to by the government, which in turn leads to discipline. Fiscal policy leads to a reduction in the obligations incumbent on the government. Adhering to the financial rules would correct the course of fiscal policy in Iraq, with the need to direct oil revenues in the years of financial abundance when global oil prices rise to sovereign funds similar to other rentier countries, which contributes to maintaining the stabi
... Show More