Thethesis of theresearch is to deal with relations between Russia and Yemen after 2011.That relationwas significant in different fields, historic, economic, strategic and cultural ones. There are mutual interestsbetweenRussia and Yemen, especially with the economic development and growth in Russia as an important partner to Yemen.Their has to an a great deal of progress in different types of relations, where as they were only partner in military relations. The studywasclassifiedintoto three sections: the first section dealt with strategic importance of Yemen to Russia. And second section dealt withthe military factor between Russia and Yemen. While the third section dealt with the economic factor between Russia and Yemen. In addition to conclusion.
This paper describes the geotechnical properties of Al-Ammarah soil of Ammarah city in Messan Governorate-southern parts of Iraq. Data and other information taken from numbers of geotechnical reports that performed under the supervision of Consulting Engineering Bureau of Baghdad University. This research is devoted to study the correlation between different physical properties such as (LL, PI, LI, n,t, e) with different mechanical properties such as (qu, cc, cs, SPT). The correlation is verified using simple regression analysis. From the regression results it was found that there is direct correlation between different parameters. By using the correlation-with some information- preliminary investigation stages and studies of any s
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreABSTRACT This paper has a three-pronged objective: offering a unitary set of semantic distinctive features to the analysis of nominal “hatred synonyms” in the lexicon of both English and Standard Arabic (SA), applying it procedurally to test its scope of functionality crosslinguistically, and singling out the closest noun synonymous equivalents among the membership of the two sets in this particular lexical semantic field in both languages. The componential analysis and the matching procedures carried have been functional in identifying ten totally matching equivalents (i.e. at 55.6%), and eight partially matching ones (i.e. at %44.4%). This result shows that while total matching equivalences do exist in the translation of certain Eng
... Show MoreDeontic modality expresses what is necessary or possible according to the norms of morality and laws of community. It is a cover term for those cases where modal auxiliaries used to express notions like ''obligation'', ''prohibition'' and, ''permission''. Deontic modals are basically performatives, having the ''so-be-it'' component of directives in that the speaker directs the behavior of the addressee to get things done. The present study identifies the use of deontic models in international contracts to prove that there are major pragmatic strategies employed in writing them. To achieve the aim of the study, a modified model of Danet’s (1980) and Trosborg’s (1995) in accordance to Searle (1969) is used to analyze 16 texts selected fro
... Show MoreRecently, the environmental isotopes are adopted to figure out the hydrological processes, recharge areas, flow paths, groundwater origin and the interaction between different watery bodies. Currently, five samples of the rainwater have been collected since January to April 2012, as well as December 2011. Those sampling periods have highest amounts of precipitation events. Meantime, 25 samples of groundwater, 5 of the Lesser Zab River and 3 of overland flow have been picked up during the wet period. The dry sampling of groundwater and the Lesser Zab River has been achieved in summer 2011. The Local Meteoric Water Line lies between Global Meteoric Water Line (GMWL) and East Mediterranean Water Line (EMWL). The lowest, highest and
... Show MoreBuzurgan oil field suffers from the phenomenon of asphaltene precipitation. The serious negatives of this phenomenon are the decrease in production caused by clogging of the pores and decrease in permeability and wettability of the reservoir rocks, in addition to the blockages that occur in the pipeline transporting crude oil. The presence of laboratories in the Iraqi oil companies helped to conduct the necessary experiments, such as gas chromatography (GC) test to identify the components of crude oil and the percentages of each component, These laboratory results consider the main elements in deriving a new equation called modified colloidal instability index (MCII) equation based on a well-known global equation called colloidal in
... Show MoreThe present study examines critically the discursive representation of Arab immigrants in selected American news channels. To achieve the aim of this study, twenty news subtitles have been exacted from ABC and NBC channels. The selected news subtitles have been analyzed within van Dijk’s (2000) critical discourse analysis framework. Ten discourse categories have been examined to uncover the image of Arab immigrants in the American news channels. The image of Arab immigrants has been examined in terms of five ideological assumptions including "us vs. them", "ingroup vs. outgroup", "victims vs. agents", "positive self-presentation vs. negative other-presentation", and "threat vs. non-threat". Analysis of data reveals that Arab immig
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More