Arabian Political Regimes: Problems of Policies and Rule; An Introduction to Interpreting (The Arabian Spring) The Arab Region witnessed, since 2011, critical changes overthrew a group of Arab regimes in some of its countries, and the reaction of these changes are still going on up to now. These changes were given lots of justifications and interpretations. The current study tries to concentrate on the most important problems which were due to what was known as (The Arab Spring). The study proposes that the crisis which the countries of the area are exposed to is not spontaneous in many of its aspects. It is totally a crisis of rule and policies. Because it is a reflection of the nature of authority in the Arabian regimes on the one hand; and a reflection of mechanisms of power practicing in the Arab societies on the other. Therefore, the current study tries to focus on the most important problems that are related to the crisis of forming or starting the Arab State on the one hand, and the crisis of the legitimacy of the regimes on the other and the problem of the relation between the government and the society on a third hand.
The study aimed at recognizing the availability of the cultural intelligence dimensions in social studies book at the high school in the kingdom of Saudi Arabia (curricula system- joint program). The study used the descriptive approach and content analysis method. As tools of the study, the study adopted a list of cultural list of indicators and dimensions that suits the secondary stage social curricula. It further adopted a content analysis form designed to analyze the social studies book in the secondary school in the kingdom of Saudi Arabia. The study has reached several results, the most significant results were: There is a difference in including the cultural intelligence dimensions in social studies book at high school in the kingd
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreDamascus has great importance throughout its history and has increased in the Umayyad period, It was interested the by Caliphs, and became the capital of the Islam, But the late Umayyad era has witness of troubles and political, this led to collapse the Umayyad state and take the Abbasid rule, despite the neglect of the Abbasids for this city and they left to others, but it remains of great concern by some of the Abbasid caliphs.
Damascus has great importance throughout its history and has increased in the Umayyad period, It was interested the by Caliphs, and became the capital of the Islam, But the late Umayyad era has witness of troubles and political, this led to collapse the Umayyad state and take the Abbasid rule, despite the neglect of the Abbasids for this city and they left to others, but it remains of great concern by some of the Abbasid caliphs.
واقع الدراسات الاورومتوستطية في الجامعات العراقية "دراسة حالة كلية العلوم السياسية - جامعة بغداد"
Isobaric Vapor-Liquid-Liquid equilibrium data for the binary systems ethyl acetate + water, toluene + water and the ternary system toluene + ethyl acetate + water were determined by a modified equilibrium still, the still consisted of a boiling and a condensation sections supplied with mixers that helped to correct the composition of the recycled condensed liquid and the boiling temperature readings in the condensation and boiling sections respectively. The VLLE data where predicted and correlated using the Peng-Robinson Equation of State in the vapor phase and one of the activity coefficient models Wilson, NRTL, UNIQUAC and the UNIFAC in the liquid phase and also were correlated using the Peng-Robinson Equation of State in both the vapo
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication
... Show MoreThe growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
The objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association
... Show More