Despite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving security. Researing about Brent Scowcroft’s role in meeting the requiremnets of the united States’ national security, it has been found necessary to include two pivots to the study. The first pivot disscusses the requirements of achieving the national security of the United States of America, whereas the second pivot tackles Brent Scowcroft’s role, through the mechanisms of the national security council, in achieving the national security requirements in particular within the decision-making process in the history of the contemporary American political system. As for the type of the study, it is a historical study within the axis of contemporary American politics, while the methodology of the study came within the scientific analysis and according to the narrative and descriptive historical approach. This is because the research problem emphasizes the identification of the security and military requirements in order to achieve the integration of the national security of the United States. Finally, the conclusions have verified the National Security Adviser’s prominent role of during the Scowcroft era, in conductng partnership with the Ministry of Foreign Affairs in the decision-making process. The latter has said to affect the overall foreign policy and achieve the national security requirements of the United States of America at the end of the last century.
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThe study aims at knowing the actual uses of instructional technology in teaching history subject in the colleges of education for humanities from the college staff members' perspectives and their attitudes towards it. The sample of the study consisted of (24) instructors from the Colleges of Education for the Humanities, the College of Basic Education- Haditha and the College of Education for Women, the study used the descriptive method, and the questionnaire was consisted of (50) items, and the psychometric properties of the instrument of the study were extracted. The researchers used the appropriate statistical means to analyze the data, and the results of the study showed the following: the teaching staff attitudes towards the use of
... Show MoreAbstract:
Today, the financial and banking sector is witnessing a qualitative shift thanks to financial technology services, which provide their services to many individuals and companies in quick, easy and less expensive ways compared to traditional means. Financial technology is a new form of financial science that combines financial transactions and technological skills concerned with providing financial services and improving the work environment within Banking institutions, and financial technology provides many advantages such as lower transaction costs, instant payment, and saving more time and effort in conducting banking
... Show MoreWhen the Italian fascist party leaded & access to the top of regime, it took Benito
Mussolini as a post of Italian prime minister on 1922, that lead to rise the voices which need
to find colonies of Italy, like other colonial countries, especially that of its colonies in Libya,
Eritrea and Somalia were not achieved its ambitions, was to be the occupation of Ethiopia to
revive her dreams to exert control over the Red sea and the Mediterranean and the
establishment of a vast empire satisfy colonial ambitions.
the Italian invasion of Ethiopia gained particularly important, what led to the
disruption of the balance of political forces is not at the level of local powers in the region,
but at the level of the exten
Background: The styloid process is a cylindrical bone (protrusion). It situated above the common carotid artery between the external and internal branches immediately proximal to the internal jugular vein and facial nerves. The styloid process varies in length also it may be absent as well as elongated. Classically, an elongated styloid process and calcified of stylohyoid ligament causes Eagle’s syndrome. The aim of this study was to examine the styloid process using 3 dimensional multi-detector computed tomography (3D-MDCT) to detect the presence of Eagle’s syndrome that causes severe headache and migraine. Materials and methods: One hundred patients with severe headache and migraine were exposed to 3D- multi-detector CT with special
... Show MoreThe research problem is that most of the construction projects exceed the planned value, due to the failure to implement the plans on time. The current study aims to monitor the implementation of the project and for each of the executed tasks of the table of quantities in order to detect deviations at the time they occur, evaluate the time and cost performance, and then identify the areas of waste and analyze the implementation of each task in order to diagnose the underlying problems and find possible and applicable solutions in the environment Iraqi. The research was applied in one of the companies specialized in the field of construction projects, and one of the most important conclusions reached is the possibility of applying
... Show MoreThis study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance
Summary
The fundamental turning point in American policy towards the Iran was the success of the Islamic revolution in Iran 1979 . Since than U S policy has been hostile to Iran . After the events 11 September 2001 , there was an American idea of dialogue with some countries opposed to US policy , including Iran . In 2004 the United States launched the Greater Middle East project , which contain a range of political , economic and cultural proposals for the region , all of which were in the interest of the United States and ( Israel ) , which Iran opposed . The failure of U S projects in region prompted the United States to agree with Iran on the nuclear file . On 8 May 2018 U S President Donald Trump of
... Show MoreThis study aims to identify the role of electronic management in simplifying the work procedures at Imam Muhammad bin Saud Islamic University. The study was based on the random sample of (366) individuals. The data were collected through interviews and questionnaire. The statistical tests were applied according to the data and the study hypotheses: Cronbach’s Alpha, mean, standard deviation, Z test, ANOVA. The study concluded numbers of results: Imam Muhammad bin Saud Islamic University applies electronic management in its administrative processes (planning, organizing, directing, controlling) to a very high level. There are substantial differences in the views of the sample me
... Show MoreOccupies total quality management applications play a key role in the development of institutions of higher education performance and achieve its strategic objectives through the commitment of senior management and their employees to continuous improvement of the quality of performance in the various areas of work, and can be integrated knowledge management processes, which means identifying information of value and how to take advantage. The data were collected using the style of the questionnaire for the purpose of analyzing their results on a sample composed of 83 member of the administrative leadership in colleges as representing the decision-making centers in those colleges .
 
... Show More