Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all rivers will have serious repercussions, affecting the agricultural and industrial production, food security, particularly Egypt as it exploits (85%) of the river water for agricultural purposes, and thus water share to be below the required threshold, so unlike all the other Nile basin countries that have many other sources so is the subject of the Nile water for Egypt is a national security issue in the absence of a comprehensive agreement includes all the riparian states of the Nile River, especially with the presence of external forces (such as the US and Israel) are trying to provoke differences in order to become a party to take advantage of the territorial waters and international, which will cause adverse effects (current and future) to downstream (Egypt and Sudan), represented by (water deficit grave) will happen by filling the tank with water period, and after the collapse of the dam being built on an extremely rugged slope on the plateau, the prospects for its collapse is very high.
The study aimed at designing a training program by using training for the anaerobic differential threshold stand and the effects of those trainings on the variables of (Concentration of Lactic Acid and LDH Enzyme, VO2 MaX and Cortisol Hormone). The Researchers used the experimental program with one-group style. Also, they used a sample with (8) men-players in a (free 400 m men-runners) and they used many instruments and procedures, most notably the training-program prepared for 10 weeks and for 3 training units weekly, (70-90 min) for each unit. They used the training intensity from 85-100% of the player's ability. After finishing the training program and doing some pre-tests and post-tests then statistically checking the results, the resea
... Show MoreHuman witnessed over the centuries many of the important issues faced by the international community was centered on human rights in general and the persecution of refugees, especially according to many forms may be directly or indirectly leaves behind economic crises, social and humanitarian push world countries to rethink the mechanisms and the feasibility of developing agreements and laws and the role of international and regional organizations to protect peoplerefugeestatus.
The current research aims to know the complementary use of the paper book and the digital book by defining the paper book and the digital book and knowing the methods and methods of obtaining each of them and indicating the extent of their use and for what purpose and knowing the difficulties that researchers face in using each of them and which is better using the paper book or the digital book in preparing research Studies and for no reason. The research relied on the descriptive approach and the questionnaire as a tool for data collection, and it was distributed to professors and students of Iraqi universities. The research sample reached (219) individuals and reached a set of results, the most important of which are: Preference for the
... Show MoreAbstract:
Saudi Arabia and United States long relation could present an important
subject to understand alliance kind in international relations types. We trying
in this study to diagnose and analyze the Saudi Arabia and United States
model to find balance and unbalance statues and its influence on the
directions of Saudi Arabia foreign policy positions.
We divided the study in two parts, each part have many sections. The
first part deal with the historian emergence of Saudi Arabia state and its
development in three stages including its foreign relations with regions and
international powers. While the second part was dedicated in analyzing and
understanding the mechanism and active facts that drawing the Sa
Inˑthis work, we introduce the algebraic structure of semigroup with KU-algebra is called KU-semigroup and then we investigate some basic properties of this structure. We define the KU-semigroup and several examples are presented. Also,we study some types of ideals in this concept such as S-ideal,k- ideal and P-ideal.The relations between these types of ideals are discussed and few results for product S-ideals of product KU-semigroups are given. Furthermore, few results of some ideals in KU-semigroup under homomorphism are discussed.
in recent years cryptography has played a big role especially in computer science for information security block cipher and public
Let R be a commutative ring with identity, and let M be a unitary left R-module. M is called Z-regular if every cyclic submodule (equivalently every finitely generated) is projective and direct summand. And a module M is F-regular if every submodule of M is pure. In this paper we study a class of modules lies between Z-regular and F-regular module, we call these modules regular modules.
The most influential theory of ‘Politeness’ was formulated in 1978 and revised in 1987 by Brown and Levinson. ‘Politeness’, which represents the interlocutors’ desire to be pleasant to each other through a positive manner of addressing, was claimed to be a universal phenomenon. The gist of the theory is the intention to mitigate ‘Face’ threats carried by certain ‘Face’ threatening acts towards others.
‘Politeness Theory’ is based on the concept that interlocutors have ‘Face’ (i.e., self and public – image) which they consciously project, try to protect and to preserve. The theory holds that various politeness strategies are used to prot
... Show MoreThis article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss
... Show MoreThe demand for electronic -passport photo ( frontal facial) images has grown rapidly. It now extends to Electronic Government (E-Gov) applications such as social benefits driver's license, e-passport, and e-visa . With the COVID 19 (coronavirus disease ), facial (formal) images are becoming more widely used and spreading quickly, and are being used to verify an individual's identity, but unfortunately that comes with insignificant details of constant background which leads to huge byte consumption that affects storage space and transmission, where the optimal solution that aims to curtail data size using compression techniques that based on exploiting image redundancy(s) efficiently.