يعد موضوع البرنامج النووي الايراني من الموضوعات التي تحظى بأهمية كبيرة في مجال الدراسات الدولية بشكل عام والدراسات الاستراتيجية بشكل خاص، وذلك لكونه لا يتعلق بمستقبل الجمهورية الاسلامية الايرانية فحسب بل بمستقبل منطقة الشرق الاوسط ولاسيما منطقة الخليج العربي، وهو ذو صله وثيقة بمستقبل انتشار الاسلحة النووية بين دول المنطقة والذي قد يؤدي انتشارها الى حروب اقليمية وقد يوظف فيها هذا النوع من الاسلحة النووية، لاسيما ان حالة عدم الاستقرار في منطقة الشرق الاوسط وسيما الخليج العربي تشكل محفزات قوة لنشر الاسلحة النووية، فضلا عن ما يثيره هذا البرنامج من اشكاليات معقدة ما بين وجهات النظر الايرانية والغربية في أطار كونه مخصصا للأغراض السلمية او العسكرية، كما ان اشكالية البحث تنصب في مدى تأثير البرنامج النووي الايراني على معادلة التوازن الاقليمي في منطقة الشرق الاوسط بصورة عامة ومنطقة الخليج العربي بصورة خاصة في حالة حيازة ايران القدرة النووية مما قد يفضي الى بروز انعكاسات خطرة على انساق العلاقات الاقليمية والدولية ويشكل اخلالا بمعادلة التوازنات الاستراتيجية
Electrical Discharge Machining (EDM) is a widespread Nontraditional Machining (NTM) processes for manufacturing of a complicated geometry or very hard metals parts that are difficult to machine by traditional machining operations. Electrical discharge machining is a material removal (MR) process characterized by using electrical discharge erosion. This paper discusses the optimal parameters of EDM on high-speed steel (HSS) AISI M2 as a workpiece using copper and brass as an electrode. The input parameters used for experimental work are current (10, 24 and 42 A), pulse on time (100, 150 and 200 µs), and pulse off time (4, 12 and 25 µs) that have effect on the material removal rate (MRR), electrode wear rate (EWR) and wear ratio (WR). A
... Show MoreObjective: The study aimed to identify the adolescents' fast foods and snacks, and find out the relationship between fast
food, snacks and adolescents' demographic data (gender and Body Mass Index). Methodology: A descriptive study
was conducted on impact of fast foods and snacks upon adolescents' Body Mass Index in secondary schools at Baghdad
city, starting from 20
th of April 2013 to the end of October 2014. Non- probability (purposive) sample of 1254
adolescents were chosen from secondary schools of both sides of Al-Karkh and Al-Russafa sectors. Data was collected
through a specially constructed questionnaire format include (12) items multiple choice questions. The validity of the
questionnaire was determined thr
Abstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreIn this research, we sought to identify the nature of the relationship between the exchange rate of the Chinese yuan and the value of Chinese exports, through the formulation of a standard model based on the model of common integration, and based on the data of the study and using the test "Angel-Granger" It reflects the relationship between the two research variables, through which the relationship between the RMB exchange rate and the value of Chinese exports was estimated during the period 1978-2017.
لقد أدت التطورات العلمية والتقنية وتطبيقاتها العملية في مختلف ميادين الحياة بشكل عام وميدان التربية والتعليم بشكل خاص إلى ظهور تغيرات في البناء التعليمي وطرائق التدريس بصيغتها الحديثة التي تنسجم في مجملها وروح العصر مما دعى المؤسسات التربوية والتعليمية وبإيعاز إلى الباحثين والمهتمين بهذا الميدان الى ضرورة متابعة الاتجاهات الحديثة ونواحي التجديد لمحتوى العملية التعليمية فيما يتعلق بالمجالات المعر
... Show Moreتعد ظاهرة الارهاب المتزايدة في العالم من اخطر اشكال التهديدات الامنية التي تواجة الدول لانها تستهدف في جانب مهم منها امن واستقرارومستقبل مجتمعاتها لاسيما اذا جمع الفعل الارهابي بين مطامع واهداف القوى الخارجية التي لا تريد استخدام ادواتها المباشرة وانما بالاعتماد على محركات في خلق الازمات داخل الدول المستهدفة
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreThe present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and col
... Show MoreBritain found itself at the end of the nineteenth century in front of many obstacles within Europe, it is to hold the coalition Russian Franco in 1894, and what form of threat to the interests of Britain in its colonies outside Europe, as well as the development of other European countries in military and economic aspects such as Germany and the United States and others. As she was defying the fleet of Britain, Germany, and the last has a naval fleet was able to protect all the way Britain and its colonies throughout the nineteenth century
The present paper discusses one of the most important Russian linguistic features of Arabic origin Russian lexes denoting some religious worship or some political and social positions like Qadi, Wally, Sultan, Alam, Ruler, Caliph, Amir, Fakih, Mufti, Sharif, Ayatollah, Sheikh.. etc. A lexical analysis of the two of the most efficient and most used words of Arabic origin Russian lexes that are “Caliph and Sheikh” is considered in the present study. The lexicographic analysis of these words makes it possible to identify controversial issues related to their etymology and semantic development.
The study is conducted by the use of the modern Russian and Arabic dictionary, specifically, (Intermediate lexicon Dictionary
... Show More