ان الحرب الاوكرانية والتصعيد الروسي ضد اوكرانيا يرتبط بصراع جيوسياسي واسع على مناطق القوة والنفوذ والمجالات الحيوية، وتنافس تجاري دولي محتدم على النفط والغاز ومسارات خطوط التجارة الدولية بين اقطاب استراتيجية دولية تتجاوز اوكرانيا، إذ يأتي الصراع ضمن اطار التحولات الدولية الراهنة والصراعات على مناطق القوة والنفوذ الجيوستراتيجي والمكانة الدولية بين القوى الدولية المؤثرة في القضايا والشؤون الدولية، ويبقى بلا شك ان الصراع بين القوى الدولية هو احد الركائز الممكنة لتفسير الدلالات الاستراتيجية للحرب الروسية- الاوكرانية اون كانت الشرارات تمس الاشكاليات الاقليمية والجيوسياسية الا ان ميزان القوى الدولي وتحولات النظام العالمي في الوقت الراهن تعد من المحفزات الداعمة لما يحاك خلف الستار من خطط استراتيجية سواء من قبل الولايات المتحدة الامريكية في سبيل احتواء روسيا الاتحادية او من قبل روسيا من جهة رغبتها في إعادة تشكيل النظام الدولي بهدف فرض هيمنتها على مجالها الحيوي الذي يشكل قيمة جيوستراتيجية متقدمة في المدرك الاستراتيجي الروسي. وعليه فان الحرب الروسية- الاوكرانية جاءت لتشكل اختباراً مهما للعلاقات الامريكية- الاوربية ومدى التزام الولايات المتحدة الامريكية بأمن اوربا واستقرارها في ظل بيئة دولية معقدة ومتشابكة الابعاد الاستراتيجية من جانب، ومن جانب اخر اثبات قوة روسيا الاتحادية كشريك أساس في إدارة تفاعلات النظام العالمي والتأثير في مداخيل ومفاعيله الاساسية والثانوية.
Metal oxide nanoparticles demonstrate uniqueness in various technical applications due to their suitable physiochemical properties. In particular, yttrium oxide nanoparticle(Y2O3NPs) is familiar for technical applications because of its higher dielectric constant and thermal stability. It is widely used as a host material for a variety of rare-earth dopants, biological imaging, and photodynamic therapies. In this investigation, yttrium oxide nanoparticles (Y2O3NPs) was used as an ecofriendly corrosion inhibitor through the use of scanning electron microscopy (SEM), Fourier transforms infrared spectroscopy (FT-IR), UV-Visible spectroscopy, X-ray diffraction (XRD), and energy dispersive X-ray spe
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreAbstract:
This research sheds light on the major sins (fornication and sodomy) as two crimes that are prohibited by the divine laws, including its conclusion by the Islamic Sharia. Major sins so that life and the universe are organized, and the individual lives a life of chastity and purity free of filth and filth. The Islamic message included a set of preventive measures and remedial methods that, if the ummah were to apply them, they would live a decent life full of noble goals.
In this research is to study the influence of the aging heat treatment on the pitting corrosion resistance of martensitic stainless steel (MSS), where a number of specimens from martensitic stainless steel were subjected to solution treatment at 1100 oC for one hour followed by water quenching then aging in the temperatures range (500-750) oC for different holding times (1,5,10,15&20) hr. Accelerated chemical corrosion test and immersion chemical corrosion test were performed on samples after heat treatment. The results of the research showed that the pitting corrosion resistance is significantly affected by the aging temperature. Where found that the aging samples at a temperature of 500 °C have the highest ra
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreIt has become clear to see the role of the small and medium enterprises in the economy, and for the continuity of these projects it is necessary to supply finance from the banks, How ever the latter suffers risk of lending.
&n
... Show MoreThe Covid-19 virus disease has been shown to affect numerous organs and systems including the liver. The study aimed to compare lipid profiles and liver enzyme levels in individuals who had recovered from Covid-19 infection. To achieve the study objectives, liver Aspartate Aminotransferase (AST), Alanine Aminotransferase (ALT), Alkaline phosphatase (ALP), Random Blood Sugar (RBS) and Lipid profile which include cholesterol, High-Density Lipoprotein (HDL), Triglycerides (T.G), Low-Density Lipoprotein (LDL), and Very low-density Lipoprotein (VLDL) were determined.
One hundred twenty serum samples were obtained, of which fifty samples were utilized as the control healthy persons (not affected by COVID) and seventy samples came f
... Show MoreAbstract
Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al
... Show MoreAbstract
Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has
... Show MoreThe principal concern of this study is Disjunct and Conjunct adverbials in the
English language. The study sets out to explore and clarify the types, nature and
structure of disjuncts and conjuncts. It also aims at testing student's performance to
evaluate the use and usage of the disjuncts and conjuncts in their written performance.
Two tests, accordingly, were given to some fifty students of at the Dept. of English, at
the college of languages (third and fourth stages) in the University of Sulaimani. The
hypothesis that the study was based on are those students use disjuncts and conjuncts
hardly enough in their writings and when doing so, they generally tend to stick only to
the most commonly used and familiar o