إن موضوع الشرق الأوسط بشكل عام اتخذ أهمية كبيرة في الكتابات والمؤلفات التي صدرت منذ بداية النصف الأول من عقد التسعينات من القرن المنصرم مع بدايات مشاريع السلام التي أعقبت انهيار الاتحاد السوفيتي وتغير الخارطة السياسية والاقتصادية والايديولوجية للعالم .وعلى الرغم ان المصطلح ليس بجديد الا ان تعابير المصطلح وددلالاته تتغير مع تغير موازين القوى واتجاهات المصالح. إذ انتقل من مصطلح جغرافي الى سياسي وهاهو يطرح من جديد على انه مصطلح اصلاحي ذو دلالات ديمقراطية وأهداف استراتيجية بعيدة المدى. وطروحات ومسميات هي في حقيقتها أهداف يةودية وامريكية يجري تنفيذها عبر خطط ومشاريع تبدأ بمقترحات تنتهي بفرضها على ارض الواقع بشتى الوسائل حتى القوة.ومشروع الشرق الأوسط الكبير لا يختلف عن هذه الحقيقة .فبعد احتلال العراق بدأت الولايات المتحدة بطرح مشاريعها لترتيب الخارطة السياسية والاستراتيجية للمنطقة المهمة بالنسبة لها اقتصاديا واستراتيجيا وسياسيا وحتى دينيا وحضاريا, متخذة من العراق قاعدة للانطلاق والضغط على الوطن العربي والدول الاخرى التي تمثل بمجملها اطراف المشروع الامريكي القديم بولادته والجديد بطروحاته وادوات تنفيذه.وهذا ما استندنا علية في اثبات فرضيتنا التي تقوم على فكرة ان جميع الطروحات والمشاريع والترتيبات التي طرحت وما زالت تطرح للمنطقة ومسارات التغيير فيةا والذي من المفترض ان يكون نحو الديمقراطية مرتبطة تعتمد على مضامين واليات تحقيق الشرق الاوسط الكبير , والعراق له دور محوري في هذه الاجندة لان اي تغيير في العراق سيتحكم بتغيير محتمل اقليمي او عربي اخر, هذا هو المخطط الامريكي والغربي لمناطق الطاقة والثروة .
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThe aim of the present study is to provide the adequate knowledge about the role of time management in facilitate the work requirements for employees of the administrative department at the Ministry of Higher Education and Scientific Research. The research depend on studying four important dimensions which are (time planning, time organization, time direction and time observation). In addition to study other five dimensions which are (new procedures, clear procedures, short procedures, the available information and the simplicity of the methods
used).Questionnaire sheets consist of (38 questions) distributed to (170) employees and (146) sheets only were considered in the study. SPSS program was used
... Show MoreThe current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question: “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.
The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat
... Show MoreIt aim current researchs֬ to identify the impact of a proposed strategy in accordance with the objectives of science in the achievement and some science processes, where the experimental method was adopted, and define the research community was students second grade averag in Education Bagdad / Rusafa third, research sample intentionally chosen as school Radwan, and (30) students experimental group and (29) of control group, research tools were achievement test and the test of science operations and use the appropriate statistical tools to process information and data, showing results, the experimental group surpassed the control group in the collection and operations science, and light it, the researcher recommended several recommendat
... Show MoreInherent fluctuations in the availability of energy from renewables, particularly solar, remain a substantial impediment to their widespread deployment worldwide. Employing phase-change materials (PCMs) as media, saving energy for later consumption, offers a promising solution for overcoming the problem. However, the heat conductivities of most PCMs are limited, which severely limits the energy storage potential of these materials. This study suggests employing circular fins with staggered distribution to achieve improved thermal response rates of PCM in a vertical triple-tube heat exchanger involving two opposite flow streams of the heat-transfer fluid (HTF). Since heat diffusion is not the same at various portions of the PCM unit,
... Show MoreEMS in accordance with ISO 14001: 2015 is considered an entry point to reduce environmental impacts, especially the effects resulting from the oil industry, which is the main source of environmental pollution and waste of natural resources, since the second revision of the standard took place in September 2015. The problem of the research was manifested in the weakness in understanding the correct guidelines that must be followed in order to obtain and maintain the standard. The purpose of this research was to give a general picture of what is behind ISO14001:2015 and how it is possible to create a comprehensive base for understanding its application by seeking the gap between the actually achieved reality, standards requirements
... Show MoreThe importance of economic and technical feasibility studies include all of the investor, the society, the banks, the project and the government. As it will assist in achieving the optimal use of the available economic incomes on the national level and arranging the projects in priority which participates in achieving the government benefit without wasting the amounts .This is the research goal So, the research covered its theoretical aspect, of SAIs and the economic and technical feasibility studies then the role of the auditors in auditing those studies Then a mechanism was proposed includes a guidebook that provides guidelines for organizing the process of preparing and auditi
... Show MoreAbstract:
The prose poem of the 1990s is considered one of the important
contributions of the Iraqi poetic scene. The poem found a position in the Iraqi
poetry because of the favor of a group of youth poets who lefty clear traces.
Their linguistic techniques often violate the domain o9f language, significance
and image.
The poems of those youth poets moved the verse towards reality to
drink from its abundant springs in order to stand on a rigid ground. Their
linguistic traces are characterized by paradox and astonishment that are used
by the poet to construct his poem.
The paradox was considered an ideal means for constructing a
poem by some of them. The poem moved towards definitions and these
de