(January 25, 2011) represented a real opportunity to bring about fundamental changes in Egyptian foreign policy and to start a new phase that would cut off all the negative and problematic aspects of Egyptian politics in the period before the revolution. Through the employment of Egypt's huge balance and the role of historical is a civilization rooted in the roots of thousands of years and Islamic reference represented over more than a thousand years the Islamic medium of religion in the start of vision and tools to achieve the Egyptian national interest, and safeguarding Egyptian national security in its comprehensive sense. The research attempts to answer a central question: Is there a role for Egyptian soft power in the Islamic world in general and in the Mediterranean region in particular? In the answer to the above question, the research will provide a basic hypothesis: "Egyptian soft power has a role and influence in the Islamic world in general and in the Middle East in particular, but the effectiveness of this role and influence varied according to the different tools and times, and the reflection on the ground." The research is based on several approaches to achieve the desired results. The analytical approach to the contents of the Egyptian discourse will be relied upon, which helped to gain insight into the nature of Egyptian foreign policy and its position on the use of soft power. And adopted a comparative approach to demonstrate Egypt's use of solid power and its use of soft power in the Middle East region. Keywords: employment strategy, soft power, January 25 events in Egypt, techno-information revolution, diplomacy, Egyptian foreign policy.
An experimental and theoretical analysis was conducted for simulation of open circuit cross flow heat
exchanger dynamics during flow reduction transient in their secondary loops. Finite difference
mathematical model was prepared to cover the heat transfer mechanism between the hot water in the
primary circuit and the cold water in the secondary circuit during transient course. This model takes under
consideration the effect of water heat up in the secondary circuit due to step reduction of its flow on the
physical and thermal properties linked to the parameters that are used for calculation of heat transfer
coefficients on both sides of their tubes. Computer program was prepared for calculation purposes which
cover a
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Shatt al-Arab is the only navigational artery in Iraq, extending from the city of Qurna to its mouth in the Arabian Gulf at the city of Al-Fao within the governorate of Basrah for a length of approximately 204 km. Its width ranges from 400 m to 2000 m, and its depth ranges from 8 m to 20 m. The southern part of it, 93 km long from Umm al-Rassas Island to Ras al-Bisha, represents the international border between Iraq and Iran, where the Thalweg line represents the border between the two countries, which is the deepest point in the riverbed (according to the 1975 Algiers Agreement). The western bank (the Iraqi side) within the common border of Shatt al-Arab is subject to continuous erosion, which leads to the shifting of t
... Show MoreIn this study, (50–110 nm) magnetic iron oxide (α-Fe2O3) nanoparticles were synthesized by pulsed laser ablation of iron target in dimethylformamide (DMF) and sodium dodecyl sulfate (SDS) solutions. The structural properties of the synthesized nanoparticles were investigated by using Fourier Transform Infrared (FT-IR) spectroscopy, UV–VIS absorption, scanning electron microscopy (SEM), atomic force microscopy (AFM), and X-ray diffraction (XRD). The effect of laser fluence on the characteristics of these nanoparticles was studied. Antibacterial activities of iron oxide nanoparticles were tested against Gram-positive; Staphylococcus aureus and Gram-negative; Escherichia coli, Pseudomonas aeruginosa and Serratia marcescens. The results sh
... Show MoreIn the present study, advanced oxidation treatment, the TiO2 /UV/H2O2 process was applied to decolorisation of the reactive yellow dyes in aqueous solution. The UV radiation was carried out with a 6 W low-pressure mercury lamp. The rate of color removal was studied by measuring the absorbency at a characteristic wavelength. The effects of H2O2 dosage, dye initial concentration and pH on decolorisation kinetics in the batch photoreactor were investigated. The highest decolorisation rates were observed (98.8) at pH range between 3 and 7. The optimal levels of H2O2 needed for the process were examined. It appears that high levels of H2O2 could reduce decolori
... Show MoreIn Baghdad city, Iraq, the traffic volumes have rapidly grown during the last 15 years. Road networks need to reevaluate and decide if they are operating properly or not regarding the increase in the number of vehicles. Al-Jadriyah intersection (a four-leg signalized intersection) and Kamal Junblat Square (a multi-lane roundabout), which are two important intersections in Baghdad city with high traffic volumes, were selected to be reevaluated by the SIDRA package in this research. Traffic volume and vehicle movement data were abstracted from videotapes by the Smart Traffic Analyzer (STA) Software. The performance measures include delay and LOS. The analysis results by SIDRA Intersection 8.0.1 show that the performance of the roundab
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreObjective: Chronic periodontitis (CP) is a common inflammatory disease that causes destruction to the supporting tissues of the teeth. Many treatment modalities tried to stop the disease progression. Platelet-rich plasma (PRP) is one of the regenerative methods that used in adjunct to conventional periodontal treatment. The aim of this study was to evaluate the anti-inflammatory effect of PRP by monitoring the lymphocyte count before and after its application to the periodontal pocket. Materials and Methods: Twenty patients, with CP and a pocket depth equal to or deeper than 4 mm, subjected to scaling, root planing, and PRP injection into the pocket. The lymphocyte count measured before an