Despite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving security. Researing about Brent Scowcroft’s role in meeting the requiremnets of the united States’ national security, it has been found necessary to include two pivots to the study. The first pivot disscusses the requirements of achieving the national security of the United States of America, whereas the second pivot tackles Brent Scowcroft’s role, through the mechanisms of the national security council, in achieving the national security requirements in particular within the decision-making process in the history of the contemporary American political system. As for the type of the study, it is a historical study within the axis of contemporary American politics, while the methodology of the study came within the scientific analysis and according to the narrative and descriptive historical approach. This is because the research problem emphasizes the identification of the security and military requirements in order to achieve the integration of the national security of the United States. Finally, the conclusions have verified the National Security Adviser’s prominent role of during the Scowcroft era, in conductng partnership with the Ministry of Foreign Affairs in the decision-making process. The latter has said to affect the overall foreign policy and achieve the national security requirements of the United States of America at the end of the last century.
Abstract
The aim of this paper is to investigate and discuss the mechanisms of corrosion of epoxy coatings used for potable water tanks. Two distinct types of Jotun epoxy coatings: Tankguard 412 contained polyamine cured epoxy and Penguard HB contained polyamide cured epoxy, were tested and studied using the electrochemical impedance spectroscopic (EIS) method. The porosity of epoxy coatings was determined using EIS method. The obtained results showed that the two epoxy coatings have excellent behavior when applied and tested in potable water of Basrah city. Polyamine is more resistance to water corrosion compared to polyamide curing epoxy and has high impedance values. Microscopic inspection after te
... Show MoreIn this paper, a least squares group finite element method for solving coupled Burgers' problem in 2-D is presented. A fully discrete formulation of least squares finite element method is analyzed, the backward-Euler scheme for the time variable is considered, the discretization with respect to space variable is applied as biquadratic quadrangular elements with nine nodes for each element. The continuity, ellipticity, stability condition and error estimate of least squares group finite element method are proved. The theoretical results show that the error estimate of this method is . The numerical results are compared with the exact solution and other available literature when the convection-dominated case to illustrate the effic
... Show MoreIn this manuscript has investigated the synthesis of plasma-polymerized pyrrole (C4H5N) nano-particles prepared by the proposed atmospheric pressure nonequilibrium plasma jet through the parametric studies, particularly gas flow rate (0.5, 1 and 1.5 L/min). The plasma jet which used operates with alternating voltage 7.5kv and frequency 28kHz. The plasma-flow characteristics were investigated based on optical emission spectroscopy (OES). UV-Vis spectroscopy was used to characterize the oxidization state for polypyrrole. The major absorption appears around 464.1, 449.7 and 435.3 nm at the three flow rate of argon gas. The chemical composition and structural properties of the
... Show MoreThe development of economic and environmentally friendly extractants to recover cobalt metal is required due to the increasing demand for this metal. In this study, solvent extraction of Co(II) from aqueous solution using a mixture of N,N0-carbonyl difatty amides (CDFAs) synthesised from palm oil as the extractant was carried out. The effects of various parameters such as acid, contact time, extractant concentration, metal ion concentration and stripping agent and the separation of Co(II) from other metal ions such as Fe(II), Ni(II), Zn(III) and Cd(II) were investigated. It was found that the extraction of Co(II) into the organic phase involved the formation of 1:1 complexes. Co(II) was successfully separated from commonly associated metal
... Show MoreBackground: The use of osseointegrated fixtures in dentistry has been demonstrated both histologically and clinically to be beneficial in providing long term oral rehabilitation in completely edentulous individual. Most patients suffer from denture instability; particularly with mandibular prosthesis, the use of dental implant will be benefit significantly from even a slight increase in retention. The concept of implanting two to four fixtures in a bony ridge to retain a complete denture prosthesis appealing therefore, as retention, stability and acceptable economic compromise to the expanse incurred with the multiple fixture supported fixed prosthesis. Materials and methods in this study the sample were eight patients selected from a hosp
... Show More
This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.
It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<
... Show MoreTin dioxide (SnO2) were mixed with (TiO2 and CuO) with concentration ratio (50, 60, 70, 80 and 90) wt% films deposited on single crystal Si and glass substrates at (523 K) by spray pyrolysis technique from aqueous solutions containing tin (II) dichloride Dihydrate (SnCl2, 2H2O), dehydrate copper chloride (CuCl2.2H2O) and Titanium(III) chloride (TiCl3) with molarities (0.2 M). The results of electrical properties and analysis of gas sensing properties of films are presented in this report. Hall measurement showed that films were n-type converted to p- type as titanium and copper oxide added at (50) % ratio. The D.C conductivity measurements referred that there are two mechanisms responsible about the conductivity, hence it possess two act
... Show MoreThe performance of a solar assisted desiccant cooling system for a meeting-hall located in the College of Engineering/University of Baghdad was evaluated theoretically. The system was composed of four components; a solar air heater, a desiccant dehumidifier, a heat exchanger and an evaporative cooler. A computer simulation was developed by using MATLAB to assess the effect of various design and operating conditions on the performance of the system and its components. The actual weather data on recommended days were used to assess the load variation and the system performance during those days. The radiant time series method (RTS) was used to evaluate the hourly variation of the cooling load. Four operation modes were employed for perform
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More