Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to uncertainty about the intentions of the rising power in the region, which is important to China. China has many memories of Japan's militarization from World War I, World War II, and beyond, when Japan became the cornerstone of the U.S. containment strategy for popular China in 1949. Therefore, this study aims to define cyber power, regional conflict management strategies, and cyber power pillars in general. The study also elaborates on the Chinese strategies used in cyber actions in its conflict with Japan after 2017.
No country in the world has an ancient heritage of its own. It represents the product of the civilizations left behind by previous eras. It represents the development of urban life and its capital of the interest of its people in the field of construction and reconstruction. The urban heritage and its associated arts may seem to be a material heritage at first glance, but it is not free from the spiritual side. Therefore, the nations in different parts of the earth cherish it and care for it with all due diligence, because it mixes with its history, memories and emotions.
This research discusses the use of local environment materials in the production of urban fabric constituents. I
The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show MoreFounding a System to secure deposits and protecting the depositors is considered one of the important and exchanged subjects out there in the banking system/field in Iraq at the current time, and the reason behind the exchange and spread of this subject is due to the financial crisis of which the banking sector is suffering from and the stumbling of many banks, those factors have had led to the insecurity of the depositors and their mistrust towards banks, thus, it is necessary to create a system to secure deposits in which depositors would be compensated for the losses caused by the banks' failures. in addition, it could be a countermeasure system which maintains the banking stability, protects the rights of depositors and gains
... Show MoreThe purpose of the research is to study the impact of knowledge management (personalization and coding strategy) in achieving strategic excellence in the environment of Iraqi private banks, and the descriptive and analytical research approach has been adopted, so the researcher adopted positive philosophy according to the deductive approach for the purpose of deriving the first research hypothesis from the theoretical side and the research reached a group of The most important results are that the personalization strategy has made great progress in its ability to influence strategic superiority as a responsive variable, as the civil bank departments were successful in employing the changes that occurred in the personalization str
... Show MoreThe issue of insurance against unlawful risks raises a jurisprudential and judicial debate between two opposing trends: the first considers coverage of these risks invalid due to their impact on public order or morals, while the second—which this research analyses—calls for the possibility of covering these risks in specific circumstances, based on contractual considerations in accordance with the principle that the contract is the law of the contracting parties, and based on the obligation to compensate the harmed third party—the victim—who has no connection to the unlawful act. In this context, our research highlights that contractual considerations can justify coverage of some unlawful risks, provided that the goal is to achieve
... Show MorePhotodynamic Action (PDA) by using appropriate wavelength of irradiation conjugated with porphyrin derivatives is a powerful mechanism of tumor destruction. Hematoporphyrin derivative has been shown to selectively localize in neoplastic cells and then cause destruction of them by generation of singlet oxygen when activated by low power He-Ne laser. Light which used in this study has been emitting from this laser has a wavelength equal to 632.8 nm (red light). Doses of laser had been varied from 3.6 J/cm2 to 14.4 J/cm2 . The beam of laser adjusted with a modified tissue culture plate. Cell lines had exposed to Hematoporphyrin D (HpD) for 24 hours before Laser exposure, their concentrations were varied from 5 µg/ml to 80 µg/ml. Resu
... Show MoreMultilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated d