Despite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving security. Researing about Brent Scowcroft’s role in meeting the requiremnets of the united States’ national security, it has been found necessary to include two pivots to the study. The first pivot disscusses the requirements of achieving the national security of the United States of America, whereas the second pivot tackles Brent Scowcroft’s role, through the mechanisms of the national security council, in achieving the national security requirements in particular within the decision-making process in the history of the contemporary American political system. As for the type of the study, it is a historical study within the axis of contemporary American politics, while the methodology of the study came within the scientific analysis and according to the narrative and descriptive historical approach. This is because the research problem emphasizes the identification of the security and military requirements in order to achieve the integration of the national security of the United States. Finally, the conclusions have verified the National Security Adviser’s prominent role of during the Scowcroft era, in conductng partnership with the Ministry of Foreign Affairs in the decision-making process. The latter has said to affect the overall foreign policy and achieve the national security requirements of the United States of America at the end of the last century.
Polycystic ovary syndrome (PCOS) is the most endocrine problem in women of regenerative age. PCOS women typically belong to an age and sex group which is at higher risk for severe coronavirus disease (COVID-19). COVID-19 targets cells through angiotensin-converting enzyme 2 (ACE2) receptor presents on cells in veins, lungs, heart, digestion tracts, and kidneys. Renin-Angiotensin System (RAS) over activity has likewise been described in metabolic disorders; type 2 diabetes mellitus (T2DM), and conditions shared by women with polycystic ovary condition. The point of this study is to know the job of renin and ACE2 in PCOS and coronavirus and its relationship with hormones and other metabolic parameters related. The study groups consist of 1
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreThroughput accounting is concerned with a throughput measurement process to determine the efficiency of the company, to know the problems and obstacles it suffers from, to determine their causes and ways to address them.The research problem is represented by the following question: does the application of a throughput accounting lead to maximizing the company's profits? The aim of the research is to demonstrate the importance of throughput accounting, which is one of the tools of management accounting in providing an efficient information system that provides the company’s management with the information it needs to improve its production processes, increase a throughput, and thus maxi
... Show MoreThe research Reviews the sides of highlight importance of the Nano-Accounting which doing the accounting performance functions fully computerized without the intervention of an accountant, to solve the problem of not keeping up the rationalization of recording and accounting systems, with the rationalization of production which fully computerized.(be invisible and hidden accounting), resulting by linking or interaction of the accounting, additive production system represented three-dimensional printers, open source and recycling. That which result the rationalizing the facilities of production, organization and self-control which derived nanotechnology idea, which aims to minimize materials and change it properties, then view the a
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreThis study aims to identify the level of students’ awareness at Imam Muhammad bin Saud University of the requirements of married life in the light of social changes and suggested methods to deepen this awareness (according to the Islamic educational vision) from their own perspective. In this study, the researcher used the descriptive approach with a survey research method, depending on questionnaires to collect data, which he applied to students of College of Sharia in Imam Muhammad bin Saud Islamic University, as well as, students in the fields of Sociology, Social Work, and Psychology in the College of Social Sciences. The findings of the study revealed that students are aware of the requirements of married life concerning mutual ri
... Show MoreThe current research aims to show the impact of the international auditing standard IAS 540 in reducing income smoothing practices in Iraq. To achieve the objectives of the research, the researcher adopted a questionnaire for a sample of auditors in Iraq. Where 60 forms were distributed and after the questionnaire was retrieved and statistical analysis was done using the SPSS program, The research reached a number of results, the most important of which are: the existence of a statistically significant effect of the application of the international auditing standard IAS 540 in reducing income smoothing practices, The research recommended the necess
... Show More