The Sultanate of Oman is located in the far southwest of the Arabian Peninsula and enjoys a distinctive geographical location as it overlooks the Arabian Gulf and the Gulf of Oman. The Sultanate has good relations with various countries of the world and enjoys an important regional position. At the beginning of 2020, Sultan Qaboos bin Said died, and Haitham bin Tariq assumed power after him, according to the will of his cousin, the late Sultan. The new Sultan had held some important positions before 2020, including: Minister of Heritage and Culture since February 2002, Chairman of the Supreme Committee for the Future Vision (Oman 2040), Secretary-General of the Ministry of Foreign Affairs, Undersecretary of the Ministry of Foreign Affairs for Political Affairs, and Special Envoy of Sultan Qaboos bin Said. Since assuming power, Sultan Haitham bin Tariq said that he is continuing to preserve what Sultan Qaboos bin Said has accomplished and will continue with the principles of foreign policy based on peaceful coexistence, ensuring good neighborliness, working not to interfere in the internal affairs of others, not engaging in any conflict, and working to respect the sovereignty of other countries as constants of Omani foreign policy. This research deals with the issue of constitutional amendments in Oman during the reign of Sultan Tariq and the impact of those amendments on the internal and foreign policies of the Sultanate.
The activation of inflammatory cells, the release of their mediators, and the excessive production of free radicals may affect circulating lipids, but no evidence supports a role for peroxidation in the pathogenesis of Brucellosis disease. The aim of this work is to study the effect of Brucellosis on lipid profile concentration and oxidant-antioxidant status. We studied 20 Brucellosis patients (18 Females and 2 males) and 15 healthy controls (age average from 16 to 60 years old). Significant differences were noted between the serum lipids of Brucellosis patients and control group. Mean total cholesterol and low density lipoprotein cholesterol (LDL-cholesterol) concentrations were higher in patients than in control group (mean ± SE 197
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreMany researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc
... Show MorePolymer electrolytes systems compose of (PEO+KI+I2) and (PEO+RbI+I2) with different concentration, and a fixed amount of ethylene carbonate (EC) and propylene carbonate (PC) over temperatures range 293-343 K prepared by solution cast me
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreJudaism followed the approach of monotheism after God Almighty sent Moses (peace be upon him) to convey to them the messages of their Lord, so that they might be on a right guidance and path, but the people did not follow that path.” Love of matter and faith in what is witnessed, so they portrayed the Lord in several images in line with what their souls drew upon them.