تعد الحروب و الصراعات واحدة من اقدم الظواىر التي عرفتها المجتمعات البشرية وان ىذه الظاىرة تجسدت في البداية على مستوى الصراعات الفردية عندما كانت ترتقي الى مستوى الاشتباك وكانت بدائية في وسائلها وادواتها ،وكما ان ظاىرة الحرب بدأت من الاسرة ومن ثم القبيلة والعشيرة وانتهت بالدولة ،اذ ان ظاىرة الحروب بشكلها التقليدي تأخذ شكلا تدميريا بعد ان تتطور ابعادىا القصوى وان حدوثها ىو تضارب مصالح واىداف الاطراف وانها الوسيلة النهائية بعد ان تعجز الو سائل الاخرى في حسم الصراع او النزاع ،وان الحروب او الصراعات تعبر عن التناقض المفاىيمي والقيمي في مكون الايديولوجيات والمصالح والاىداف بين اطراف يصعب التوافق فيما بينهم ،وان الحرب ترتبط بالمجتمع الانساني وتعبر عن قيمتو الفكرية وعقائده الاقتصادية والفلسفية و الاجتماعية عندما تتعارض مع نظيرتها لدى الاطراف الاخرى وىي في الوقت ذاتو تعبر عن الارادة السياسية لصناع القرار من خلال نظرتهم للوسائل التي يتم بها تحقيق اىداف ومصالح دولهم.شهدت نهاية الحرب الباردة تحول في طبيعة مصادر التهديد والتي لم تقتصر على التهديدالعسكري او العدوان من طرف اخر و منها بروز العولمة الإلكترونية او الاقتصادية و البيئية كالفقر والمجاعة والامراض بالإضافة الى الحروب الاىلية والارىاب والجريمة المنظمة وتجارة المخدرات وانتشار الاسلحة ،وكما تحولت طبيعة الحروب ولم تعد حروب او صراعات بين الدول وقد اصبحت معظمها صراعات داخلية اطرافها افراد او جماعات تعمل على اضعاف الدول من الداخل في جميع النواحي ولهذا يصعب التحكم فيها ومما يجعل المنظور التقليدي للأمن عاجزا عن مواجهتها وىو مما ادى الى اعادة النظر في مفهوم الامن الانساني.
Language is an important means through which one can construct one's social world. Accordingly, the way we view ourselves and the world is basically formed by language use whereby identities, relations, and values are constructed and maintained. Most discourse analysts consider narrative not only the locus of construction and enactment of identity, but also a distinguished genre for its analysis.The present study is concerned with how identity can poetically be informed, hence exploring the way black poets use language when reflecting their identity and culture. The poem, right on: white america by the black American poetess Sonia Sanchez, is chosen to be analyzed based on Simpson's stylistic model (2004). In this model, the ana
... Show MoreAbstract :
This present paper sheds the light on dimensions of scheduling the service that includes( the easiness of performing the service, willingness , health factors, psychological sides, family matters ,diminishing the time of waiting that improve performance of nursing process including ( the willingness of performance, the ability to perform the performance , opportunity of performance) . There is genuine problem in the Iraqi hospitals lying into the weakness of nursing staffs , no central decision to define and organize schedules. Thus the researcher has chosen this problem as to be his title . The research come a to develop the nursing service
... Show MoreThis research reviews the aesthetic variables that were founded according to (theatrical rehearsal) as one of the most important pillars on which the theatrical process is based, because of its necessity in developing theatrical art on several levels that helped the theatrical director in organizing his work, and this became clear through the research chapters represented in the first chapter (methodological framework) and the second chapter, which consisted of the first topic (the duality of watching / rehearsal) and the second topic (the applications of theatrical rehearsal in theatrical experiences), all the way to the third chapter (research procedures), which included the analysis of theatrical rehearsals (sharing on life), and the
... Show MoreAbstract Twelve isolates of bacteria were obtained from samples of different soils and water amended with 100µg/ml of five heavy metals chlorides (i.e: Aluminum Al+2, Iron Fe+2, Lead Pb+2, Mercury Hg+2 and Zinc Zn+2). Four isolates were identified as Bacillus subtilis and B. subtilis (B2) isolate was selected for this study according to their resistance to all five heavy metals chlorides. The ability of B. subtilis (B2) isolate for growing in different concentration of heavy metals chlorides ranging from 200-1200 µg/ml was tested. The highest conc. that B. subtilis (B2) isolate tolerate was 1000 µg/ml for Al+2, Fe+2, Pb+2, and Zn+2and 300 µg/ml for Hg+2 for 24hour. The effect of heavy metals chlorides on bacterial growth for 72 hrs was
... Show Moreهدفت الدراسة الى تحليل محتوى كتاب الرياضيات للصف الاول متوسط على وفق مكونات المعرفة الرياضية (المفاهيم الرياضية , التعميمات الرياضية, المهارات الرياضية والمسائل الرياضية )
وتفرعت منه الاسئلة الاتية :
مانسبة المفاهيم الرياضية المتضمنة في كل فصل من فصول كتاب الرياضيات للصف الاول متوسط وللكتاب ككل ؟
مانسبة المهارات الرياضية المتضمنة في كل فص
... Show MoreCloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreEducation is a process of learning and education at the same time. As the conditions of modern life necessitate every person to keep learning, education has become a necessity to meet life needs. The society today is concerned with the educational process and aims to live up the expectations. Since education is an integral part of education and its means, it has become as a mean to achieve its purposes. The educational environment was a traditional environment limited to specific inputs, possibilities and stimulus of both teacher and student. Due to the latest advancement, the educational environment has been expanded to become a rich, with strong connections. It has expanded to encompass the entire global environment. The current
... Show MoreCarbon nanoparticles are prepared by sonication using carbon black powder. The surface morphology of carbon black (CB) and carbon nanoparticles (CNPs) is investigated using scanning electron microscopy (SEM). The particles size ranges from 100 nm to 400 nm for CB and from 10 nm to 100 nm for CNPs. CNPs and CB are mixed with silicon glue of different ratios of 0.025, 0.2, 0.05, and 0.1 to synthesis films. The optical properties of the prepared films are investigated through reflectance and absorbance analyses. The ratio of 0.05 for CNPs and CB is the best for solar paint because of its higher solar water heater efficiency and is then added to the silicon glue . Temperature of cold water and temperature of hot water in storage tank were ta
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More