The issue of nuclear proliferation is one of the most vital issues as it reflects a form of dealing in the field of international relations. Therefore, the Middle East region has taken great interest in reducing the levels of nuclear armament and acquiring nuclear power within the strategic framework of the international and regional powers. The establishment of a nuclear-weapon-free zone in the Middle East region is currently one of the most important international and regional arrangements for controlling the levels of nuclear proliferation and attempting to build a state of stability and balance. In the Middle East and the world. The importance of the research comes from the fact that it deals with an important and vital issue: the issue of nuclear proliferation and its implications for the equation of the strategic balance in the Middle East after the events of September 11, 2001, which gained great importance in the post-cold war era. And to achieve some kind of stability and balance within the framework of the international and regional environment, especially in the Middle East, which has increased the importance of efforts in this regard the proliferation of nuclear weapons to new countries, it is possible to obtain nuclear technology by enhancing levels The proliferation of weapons of mass destruction has become one of the most important facts for the post-Cold War era. At a time when only five countries possessed nuclear weapons (the United States, Russia, China, France and Britain) , As well as the possibility of other countries such as India, Pakistan and Israel, which suggests that the post-Cold War era has seen a widening of the circle of States possessing or manufacturing such weapons (Pakistan, North Korea and Iran) The emergence of regional tensions as in the case of William Middle East. Thus, the issue of non-proliferation of weapons of mass destruction has become a central issue in the context of the post-Cold War American strategy, especially after the events of September 11, 2001, as a result of the convictions that there is an interrelationship between the non-proliferation of weapons of mass destruction and the global fight against terrorism. In keeping with this, the research started from the premise that the continuity of the Middle East countries in seeking to acquire nuclear capabilities is in itself an essential brake or determinant of the establishment of a zone free of weapons of mass destruction, as well as the lack of guarantees to establish security among countries The Middle East, which is reflected negatively on the regional and international security approaches to the Middle East, and of course lead to the adoption of their respective security policies against each other within the framework of the growing levels of nuclear weapons to achieve some kind of balance towards the nuclear capabilities of each of these countries And then more nuclear armament policies in the region, as a result can not promote positive security perceptions that are based on the employment of enablers of smart power, which is reflected negatively on the strategic balance in the territory of the Middle East equation. Keywords: nuclear proliferation, the Middle East, strategic balance, the events of September 11, 2001, regional and international security, doctrine of preemptive war, preemptive war, nuclear deterrence, strategic perception, terrorism, nuclear power Nuclear proliferation.
The Present research aimed at identifying:
1- The level of environmental stress among preparatory students
2- The level of self-rebellion among preparatory students
3- The correlation between the two variables of research (environmental stress and self-rebellion) and the extent to which the independent variable contributes to the variable of the middle school students.
The current research has determined the students of the fifth stage of the preparatory stage and all the branches in the departments of education in Baghdad province the morning study for the academic
... Show More This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreThe seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.
Diamond-like carbon (DLC) homogeneous thin films were deposited from cyclohexane (Ccyclohexane (Ccyclohexane (Ccyclohexane (C cyclohexane (Ccyclohexane (Ccyclohexane (C cyclohexane (Ccyclohexane (C 6H12 ) liquid by using a plasma jet system which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with al
... Show MoreThin films of CuPc of various thicknesses (150,300 and 450) nm have been deposited using pulsed laser deposition technique at room temperature. The study showed that the spectra of the optical absorption of the thin films of the CuPc are two bands of absorption one in the visible region at about 635 nm, referred to as Q-band, and the second in ultra-violet region where B-band is located at 330 nm. CuPc thin films were found to have direct band gap with values around (1.81 and 3.14 (eV respectively. The vibrational studies were carried out using Fourier transform infrared spectroscopy (FT-IR). Finally, From open and closed aperture Z-scan data non-linear absorption coefficient and non-linear refractive index have been calculated res
... Show MoreVision loss happens due to diabetic retinopathy (DR) in severe stages. Thus, an automatic detection method applied to diagnose DR in an earlier phase may help medical doctors to make better decisions. DR is considered one of the main risks, leading to blindness. Computer-Aided Diagnosis systems play an essential role in detecting features in fundus images. Fundus images may include blood vessels, exudates, micro-aneurysm, hemorrhages, and neovascularization. In this paper, our model combines automatic detection for the diabetic retinopathy classification with localization methods depending on weakly-supervised learning. The model has four stages; in stage one, various preprocessing techniques are app
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreWind energy is one of the most common and natural resources that play a huge role in energy sector, and due to the increasing demand to improve the efficiency of wind turbines and the development of the energy field, improvements have been made to design a suitable wind turbine and obtain the most energy efficiency possible from wind. In this paper, a horizontal wind turbine blade operating under low wind speed was designed using the (BEM) theory, where the design of the turbine rotor blade is a difficult task due to the calculations involved in the design process. To understand the behavior of the turbine blade, the QBlade program was used to design and simulate the turbine rotor blade during working conditions. The design variables suc
... Show More