Intervention in International Relations from the concepts that are still highly
controversial among those he considers a breach of international law and the UN Charter and
in violation of the rule , and those who felt that the need provided, however, that this is linked
motives humanity recognized by the international community , because the international
variables proved the inadequacy of the principle of non-interference and the principle of
sovereignty as the traditional variables international , and therefore most of the international
practice came a bus with many of the behaviors that reflect a decline in its entirety to these
principles , and became adapt these principles with international reality is too complex for
being susceptible to the interests and priorities of the international.
The legal non-intervention in international relations have changed with the change of
the concept of sovereignty and the internationalization of a lot of issues, including the issue of
human rights , hence the advantage of the United States in order to enter and selectively so as
to achieve their interests , so the respect for international law in all its principles need to
activate the role of a number of institutions international influence in the face of the parties in
the international community and adjust their behavior
Concentrated research topic in the study of variables key to the work of offices of inspectors Amyin ، a (re- design function، and performance Organisational ) and took this message to know the nature of the relationship and the impact of the dimensions of the re- design function as a variable interpretative through its dimensions، is ( the diversity of skill، selecting the task ، the importance of task، autonomy، feedback )، and performance Organisational variable responsive through two dimensions are ( effectiveness ، efficiency )، and in order to test the research hypotheses were absorbed variables in the form of a questionnaire and were questionnaire primary means of gatheri
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThe role of the climate in the development of the performance of the administrative bodies of sports clubs
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis study aimed to investigate the role of Big Data in forecasting corporate bankruptcy and that is through a field analysis in the Saudi business environment, to test that relationship. The study found: that Big Data is a recently used variable in the business context and has multiple accounting effects and benefits. Among the benefits is forecasting and disclosing corporate financial failures and bankruptcies, which is based on three main elements for reporting and disclosing that, these elements are the firms’ internal control system, the external auditing, and financial analysts' forecasts. The study recommends: Since the greatest risk of Big Data is the slow adaptation of accountants and auditors to these technologies, wh
... Show MoreViolence is one of the most serious threats facing societies because it affects their internal structure and threatens the security and stability of society. It is classified as one of the types of security crises that are emerging in Arab and Islamic societies in particular, and in most countries of the world in general.
The threat of this crisis is increasing. Terrorism is considered as one of the most serious aspects of that all the countries of the world, currently, suffer from. The terrorism has begun to penetrate deep into society in one way or another starting from the Second World War, which led to the emergence of leftist movements in Western Europe, Japan, France, Italy and other countries as a result of emerging ideas
... Show MoreTo find out the impact of maternal risk factors on the outcome of pregnancy in Baghdad city. A descriptive purposive study was carried out on 100 postpartum women who had delivered for 1 hr. to 24 hrs. ago . the study sample was selected from three hospitals in Baghdad city ( Baghdad teaching hospital ,Fatima Al-Zahra'a maternity and pediatric teaching hospital and Al-Yarmook teaching hospital),during the period from 25 Jan. to 25 Feb. 2006. The data were collected through the use of questionnaire format reviewing pregnants' records and personal interview and were analyzed by using descriptive and inferential statistical approaches. The finding revealed that maternal pregnancy complications had weak effects on pregnancy outcome , while mate
... Show More