In the South of yement, when the accupation of Aden in 1839 by the British, British politics has proceeded in accordance with interests in promoting the existence and exploitation of this important site to implement their interests. Historians believe that Britain played a major role in the conflicts that have taken place on the land of Yemen, through a series of military and political dealings between them and the Ottoman Empire prior to withdrawal of Yemen and between local authorities and power to Yemen, such interactions have led to very serious consequences for the future of Yemen and Yemen was often divided into three parts, the northern areas under the authority of Imam Yahya, and the South, under the control of Britain, Asir and Tihama Plains under the influence of al-Idrisi . Britain has held several legal agreements with the Yemeni parties to legitimize and justify the use of force for the purpose of maintaining their interests by treaties with the Ottoman Empire, laid the foundations for Yemen and the split in 1914, treaties concluded between them and the sheikhs and sultans were aimed at them. The aim of British policy and given legitimacy by the presence and activity on the territory of Yemen, including the treaties of friendship and resistance, and protection treaties, treaties, where the southern Yemeni partitioned (20) chiefdoms and Principality of dispute between them and try to request the foreign occupier satisfaction
Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg
... Show MoreLexicography, the art and craft of dictionary-making, is as old as writing. Since its very early stages several thousands of years ago, it has helped to serve basically the every-day needs of written communication among individuals in communities speaking different languages or different varieties of the same language. Two general approaches are distinguished in the craft of dictionary-making: the semasiological and the onomasiological. The former is represented by usually-alphabetical dictionaries as such, i.e. their being inventories of the lexicon, while the latter is manifested in thesauruses. English and Arabic have made use of both approaches in the preparation of their dictionaries, each having a distinct aim ahead. Wit
... Show MorePrecarity means the lack of social and economic networks; a considerable exposure to danger and harm. Minority groups are precariat for they lack rights and full citizenship. Precarity is related, states Judith Butler, with the individual’s performativity, and his ability to perform his gender role. Toni Morrison continually goes to past to retell the history of African Americans. The issues of race, gender and national identity are recurrent in her work. Reading her book Home (2012) evokes the idea of precarity and performativity since the two main characters, Frank and Cee are precarious characters that fail to perform their gender role properly, and eventually are exposed to hazard and harm. This research displays how African American
... Show MoreThis research is the subject of "Domination and Motivation in the Sculptures of Mona the Saudi" to the study of an accomplished Arab sculptor with its varied sculptural activity between the works of the exhibition and the works of the squares, as well as its distinguished place among the contemporary Arab sculptors. This research is divided into four chapters:
The first chapter deals with the general methodological framework of the research in terms of the research problem which is focused on the question: What is the hegemony and motivation in the sculptures of Mona Saudi? The importance of research and the need for it, including the technical scientific material concerned with the sculptural achievement of t
... Show MoreDiesel generators is widely used in Iraq for the purpose of maintaining electric power demand. Large number of operators engaged in this work encounters high level of noise generated by back pack type diesel generators used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known., in present research , quastionaire was adsministered 86 repondents in Baghdad city were exposured to wide range of noise level (80-110) dB(A) with different ages and they have different skill discretion levels. Noise levels A-weigthed decibles dB(A) were measured over 8 weeks two times aday during the 2019 summer using a sound level meter.For predicting the wo
... Show MoreThis paper presents the concepts of prepaths, paths, and cycles in α-topological spaces and studies them in orderable spaces. Also, many relationships are proved with their equivalences using some properties in topological spaces like compactness and locally connectedness.
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show More