Preferred Language
Articles
/
jcoeduw-675
The Role of Italian Occupation of Ethiopia On the Egyptian- Italian Relations 1935
...Show More Authors

When the Italian fascist party leaded & access to the top of regime, it took Benito
Mussolini as a post of Italian prime minister on 1922, that lead to rise the voices which need
to find colonies of Italy, like other colonial countries, especially that of its colonies in Libya,
Eritrea and Somalia were not achieved its ambitions, was to be the occupation of Ethiopia to
revive her dreams to exert control over the Red sea and the Mediterranean and the
establishment of a vast empire satisfy colonial ambitions.
the Italian invasion of Ethiopia gained particularly important, what led to the
disruption of the balance of political forces is not at the level of local powers in the region,
but at the level of the extended diagonals on the west coast of the red sea and horn of Africa.
Egypt had a clear position from the occupation of what connects Ethiopia common interests,
particularly the source of the river Nile.
The research which divided in to the introduction, two sections, and conclusion, taking
the first section of the Egyptian official position of the Italian occupation of Ethiopia, and
economic sanctions against Italy, while the second topic addressed the Egyptian popular
position of the Italian occupation of Ethiopia.
The research depend on a variety of sources documents come in the forefront,
including documents unpublished in the library and archives in Baghdad, the British and the
documentation is not published, as well as published documents, which was the documentary
books, as research on Arab and foreign sources, newspapers and magazines adopted.The Egyptian-Italian relations took a gradual decline in the wake of the Italian
occupation of Ethiopia in 1935, and was the Egyptian official position is identical with the
British position, at the beginning of it, but it evolved over the public pressure to stand
opposed to the occupation, especially after realizing Egyptian politicians that control of Italy
to Ethiopia means of control Lake Tana, source of the Nile and then it will be the lifeblood of
Egypt is vital, however, Italy, not to mention the control of Italy to Libya, and that means the
occurrence of Egypt between pliers Italy, so what that floated the idea of economic sanctions
against Italy until the Egyptian government announced its acceptance to apply those
sanctions, despite the lack of participation membership in the nations league, but they saw the
U.N. resolution only door that it can stand against the Italian expansion. He was to participate
in the Egyptian penal significant role in disturbing the relations with the Italians, who claimed
that they understands the Egypt's position on the grounds that he came according to what you
want Britain.
Was a popular position Egyptian prominent role in the Italian war Ethiopian, as opposed
strongly the Italian occupation of the Egyptians felt the seriousness of the occupation on their
lives and their future, and they keep their best to share with Ethiopians to repel the Italian
aggression and demonstrated dramatically by sending material and humanitarian aid to
Ethiopia was the Egyptian medical missions a big role to help the war-wounded from the
Ethiopians, as was the Egyptian parties and the press a large role in stirring public opinion
against the Italian occupation of Ethiopia.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Windows-Based Special Applications Router
...Show More Authors

The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 14 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
التهرب الضريبي واثره على التنمية الاقتصادية في العراق
...Show More Authors

Highlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elim

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Body parts idioms; across-cultural significance
...Show More Authors

0

View Publication Preview PDF
Publication Date
Thu Jan 23 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أنعكاسات عمليات التجارة الالكترونية على هيكل الرقابة الداخلية
...Show More Authors

With the growing use of electronic commerce has worked many companies, especially public shareholding to take advantage of them treated in the trade, so that the e-commerce part of the corporate environment, and this has made a career of accounting and auditing facing new challenges to the sophistication of the information and the rapid growth in the market for electronic commerce. And raised many questions about the ability of the audit profession to facing these challenges and how to audit operations of e-commerce and how to give confidence on websites, this sense it has become necessary keep the internal control systems of this technology and what has caused changes to the accounting system, and evolve to fit the developments that hav

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2008
Journal Name
Al-khwarizmi Engineering Journal
New Adaptive Data Transmission Scheme Over HF Radio
...Show More Authors

Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.

An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2007
Journal Name
Political Sciences Journal
عرض كتاب على خط النار مذكرات الرئيس الباكستاني
...Show More Authors

عرض كتاب على خط النار مذكرات الرئيس الباكستاني

View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Kindergarten Children Addiction to Tablet Devices and Its Negative Effects
...Show More Authors

The characteristic of our time is the tremendous technological progress and the wide use of the Internet. Children have had a large share of this progress.as they are becoming fond of having the technological equipment of tablets and mobile phones which become indispensable for these children cannot do without them .
Recently, the phenomenon of using mobile phones and tablets by children has become more widespread, and the society in general and parents, in particular, have ignored the reasons for their health .Despite the many advantages and benefits for children who are well trained to use these devices properly that have enhanced their cognitive and social abilities, there are many disadvantages that could harm children's growth if

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
المتغيرات الاقتصادية العالمية المعاصرة وآثارها على الاقتصادات العربية
...Show More Authors

The Arab economy suffers from many structural imbalances problems which are getting complicated by the appearance of the world economic variables.

This change held risky challenges for the Arab economies in the light of unsuitable regional and international conditions. Since that it has been very essential  for the Arab experts, especially those related to economy and politics, to face those new challenges or, at least, adapt with them believing that they can have both positive and negative impacts on the Arab economy.

This study has acquired its importance in the light of the critical levels the Arab economy reached out of the world economic variables, resulting in long-term

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref