إن موضوع الشرق الأوسط بشكل عام اتخذ أهمية كبيرة في الكتابات والمؤلفات التي صدرت منذ بداية النصف الأول من عقد التسعينات من القرن المنصرم مع بدايات مشاريع السلام التي أعقبت انهيار الاتحاد السوفيتي وتغير الخارطة السياسية والاقتصادية والايديولوجية للعالم .وعلى الرغم ان المصطلح ليس بجديد الا ان تعابير المصطلح وددلالاته تتغير مع تغير موازين القوى واتجاهات المصالح. إذ انتقل من مصطلح جغرافي الى سياسي وهاهو يطرح من جديد على انه مصطلح اصلاحي ذو دلالات ديمقراطية وأهداف استراتيجية بعيدة المدى. وطروحات ومسميات هي في حقيقتها أهداف يةودية وامريكية يجري تنفيذها عبر خطط ومشاريع تبدأ بمقترحات تنتهي بفرضها على ارض الواقع بشتى الوسائل حتى القوة.ومشروع الشرق الأوسط الكبير لا يختلف عن هذه الحقيقة .فبعد احتلال العراق بدأت الولايات المتحدة بطرح مشاريعها لترتيب الخارطة السياسية والاستراتيجية للمنطقة المهمة بالنسبة لها اقتصاديا واستراتيجيا وسياسيا وحتى دينيا وحضاريا, متخذة من العراق قاعدة للانطلاق والضغط على الوطن العربي والدول الاخرى التي تمثل بمجملها اطراف المشروع الامريكي القديم بولادته والجديد بطروحاته وادوات تنفيذه.وهذا ما استندنا علية في اثبات فرضيتنا التي تقوم على فكرة ان جميع الطروحات والمشاريع والترتيبات التي طرحت وما زالت تطرح للمنطقة ومسارات التغيير فيةا والذي من المفترض ان يكون نحو الديمقراطية مرتبطة تعتمد على مضامين واليات تحقيق الشرق الاوسط الكبير , والعراق له دور محوري في هذه الاجندة لان اي تغيير في العراق سيتحكم بتغيير محتمل اقليمي او عربي اخر, هذا هو المخطط الامريكي والغربي لمناطق الطاقة والثروة .
The aim of the present study is to provide the adequate knowledge about the role of time management in facilitate the work requirements for employees of the administrative department at the Ministry of Higher Education and Scientific Research. The research depend on studying four important dimensions which are (time planning, time organization, time direction and time observation). In addition to study other five dimensions which are (new procedures, clear procedures, short procedures, the available information and the simplicity of the methods
used).Questionnaire sheets consist of (38 questions) distributed to (170) employees and (146) sheets only were considered in the study. SPSS program was used
... Show MoreThe current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question: “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.
The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat
... Show MoreLung cancer is one of the most serious and prevalent diseases, causing many deaths each year. Though CT scan images are mostly used in the diagnosis of cancer, the assessment of scans is an error-prone and time-consuming task. Machine learning and AI-based models can identify and classify types of lung cancer quite accurately, which helps in the early-stage detection of lung cancer that can increase the survival rate. In this paper, Convolutional Neural Network is used to classify Adenocarcinoma, squamous cell carcinoma and normal case CT scan images from the Chest CT Scan Images Dataset using different combinations of hidden layers and parameters in CNN models. The proposed model was trained on 1000 CT Scan Images of cancerous and non-c
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreThis study aimed to clarify the legal provisions concerning the senses and their role in financial transactions, in the light of the definition of all the vocabulary presented by this study (senses - the definition of senses apparent: they are hearing - sight - smell - taste - touch) in the first section. The study deals with the second topic of the reference and writing denominator phrase and includes two requirements, the first requirement: the establishment of the denominator of the phrase, which has two branches: Section I: signal Akhras. Section II: Signal of the Spokesman.
The second requirement is that writing takes the place of the phrase in financial transactions. The owners argue that the sale of the blind is correct a
The present study is meant to inquire about the training needs of middle stage leaders in Bisha, (Saudi Arabia) from the perspective of teachers. To achieve this purpose, the researcher has designed a questionnaire containing (31) items, distributed to a sample of (157) teacher (male and female) from the target population.
This research has demonstrated that the level of training needs for middle stage leaders was moderately reported with an arithmetic mean equivalent to (2.42), and a standard deviation of (0.36). Results have shown no significant differences at (α=0.05) in the sample’s expectations of the study’s variables.
The study concludes with a list of recommendations such as working on developing training pro
... Show MoreThe aim of the current research is to find out the extent to which algebraic thinking skills are included in the mathematics textbook for the third intermediate grade for the academic year (2020-2021) by answering the main research question:What algebraic thinking skills are included in the mathematics textbook for middle third grade?The descriptive and analytical approach was used, and to achieve the goal of the research, a list of the main algebraic thinking skills and the sub-skills were prepared, and after analyzing the content of the mathematics textbook, the stability of the analysis was verified through the analysis over time and across individuals using the Holsti equation, and
... Show MoreThe study examines the root causes of delays that the project manager is unable to resolve or how the decision-maker can identify the best opportunities to get over these obstacles by considering the project constraints defined as the project triangle (cost, time, and quality) in post-disaster reconstruction projects to review the real challenges to overcome these obstacles. The methodology relied on the exploratory description and qualitative data examined. 43 valid questionnaires were distributed to qualified experienced engineers. A list of 49 factors causes was collected from previous international and local studies. A Relative Important Index (RII) is adapted to determine the level of importance of each sub-criterion in the fou
... Show MoreThe importance of economic and technical feasibility studies include all of the investor, the society, the banks, the project and the government. As it will assist in achieving the optimal use of the available economic incomes on the national level and arranging the projects in priority which participates in achieving the government benefit without wasting the amounts .This is the research goal So, the research covered its theoretical aspect, of SAIs and the economic and technical feasibility studies then the role of the auditors in auditing those studies Then a mechanism was proposed includes a guidebook that provides guidelines for organizing the process of preparing and auditi
... Show More