Abstract:
This research aims to the importance of oil in achieving economic
security in the Arab. Oil is not an ordinary subject and returns it significance to
the followings:
1. The importance of skipping a source of energy.
2. The importance of oil as raw material for petrochemical industry.
3. The importance of the oil sector as an area of foreign investment
4. The importance of oil in the marketing activities, transport, insurance
and various services
In addition to the importance of oil in general and the Arab oil has
additional strategic advantages such as geographic location, And the
magnitude of reserves and production of heavy investment costs are relatively
simple, And the ability to meet the emergency needs of the market quickly and
at low cost.
These features and benefits that are granted to the decision makers in
the Arab oil sense, power and ability to meet the emergency needs of the
market quickly and at low cost.
Due to the popularity of radar, receivers often “hear” a great number of other transmitters in
addition to their own return merely in noise. The dealing with the problem of identifying and/or
separating a sum of tens of such pulse trains from a number of different sources are often received on
the one communication channel. It is then of interest to identify which pulses are from which source,
based on the assumption that the different sources have different characteristics. This search deals with a
graphical user interface (GUI) to generate the radar pulse in order to use the required radar signal in any
specified location.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThe continued acceleration in the business environment has led to the need for organizations great attention to quality applied in organizations to meet the needs of customers and stay in the market for as long as possible.
Search launched from the underlying problem is the presence of concentrations of defects and waste plaguing the company and to achieve the goal of the study detects the level of quality applied in the factory vessels and reservoirs of the General Company for Heavy Engineering Equipment, As well as calculate wastage rates occurring in the production process and find a relationship between the level of quality and ratios defective in each type of waste, it has been used quantitative meas
... Show MoreThis research deals with the study of the relationship between the success factors as the independent variable and product strategies as the dependent variable , has reacted to these variables to form the frame , which is the research which centered research problem about the extent to which industrial companies the vision and knowledge of Muslim women survive and develop in the business market , which can be expressed about the extent of awareness of corporate success factors and the use of product strategies and what the relationship between the factors and strategies , while expressing the importance of research to make the focus on the product occupies a paramount importance in the industrial sector companies in relation to t
... Show MoreThis study explored the use of industrial acidic crude palm oil (ACPO) for biodiesel production, facing a significant obstacle due to its high free fatty acid (FFA) content, which complicates the biodiesel production process. Typically, esterification is employed to convert FFAs into fatty acid methyl ester (FAME). Herein, the effectiveness of tungstosilicic acid hydrate (TSAH) as an unsupported heteropoly acid (HPA) catalyst for FFA esterification in ACPO was investigated. The FFA content was reduced from 8.43% to 0.95% under optimum conditions (4 wt% catalyst dosage, a methanol to oil molar ratio of 10:1, 150 min and a temperature of 60°C). Noteworthy, the TSAH catalyst showed stability over 7
The study deals with the issue of multi-choice linear mathematical programming. The right side of the constraints will be multi-choice. However, the issue of multi-purpose mathematical programming can not be solved directly through linear or nonlinear techniques. The idea is to transform this matter into a normal linear problem and solve it In this research, a simple technique is introduced that enables us to deal with this issue as regular linear programming. The idea is to introduce a number of binary variables And its use to create a linear combination gives one parameter was used multiple. As well as the options of linear programming model to maximize profits to the General Company for Plastic Industries product irrigation sy
... Show MoreBackground: The most crucial mechanism of genetic variation in N. meningitidis is the slipped strand mispairing, this mechanism generates Phase variation using simple sequence repeat (SSR) and is commonly used by the N. meningitidis to escape the immune system despite its function in eradicating the pathogenic and commensal bacteria. Some of simple sequence repeats (SSRs) that located within the genome works as phase variation while other SSRs have no role in generating phase variation mechanisms. Therefore, Aim: the main goal of the current in silico study was to detect the probability of SSR to enroll with phase variation for the entire N. meningitidis genome. Methods: Different criteria were used to judge SSR as
... Show More