Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their basic needs,altimitly means a decent living and freedom and the end for , and it supposed for most respect for human rights through democratic framework.
Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreAbstract
The study presents a mathematical model with a disaggregating approach to the problem of production planning of a fida Company; which belongs to the ministry of Industry. The study considers disaggregating the entire production into 3 productive families of (hydraulic cylinders, Aldblatt (dampers), connections hydraulics with each holds similar characteristics in terms of the installation cost, production time and stock cost. The Consequences are an ultimate use of the available production capacity as well as meeting the requirements of these families at a minimal cost using linear programming. Moreover, the study considers developing a Master production schedule that drives detailed material and production requi
... Show MoreThis paper concerns is the preparation and characterization of a bidentate ligand [4-(5,5- dimethyl-3-oxocyclohex-1-enylamino)-N-(5-methylisoxazol-3-yl) benzene sulfonamide]. The ligand was prepared from fusing of sulfamethoxazole and dimedone at (140) ºC for half hour. The complex was prepared by refluxing the ligand with a bivalent cobalt ion using ethanol as a solvent. The prepared ligand and complex were identified using Spectroscopic methods. The proposed tetrahedral geometry around the metal ions studied were concluded from these measurements. Both molar ratio and continuous variation method were studied to determine metal to ligand ratio (M:L). The M to L ratio was found to be (1:1). The adsorption of cobalt complex was carried out
... Show MoreIn the 1970s, the world knew the long-tailed nesokia Nesokia bunnii (Khajuria, 1981) (Rodentia, Muridae) from the Mesopotamian marshes of Garden of Eden in Southern Iraq. This distinct rodent was known from only five voucher specimens collected at the confluence of Tigris and Euphrates Rivers in southern Iraq while its occurrence in Southwestern Iran had
never been reported. In the 1990s, a large extent of its natural habitat was catastrophically desiccated and the animal was last seen in the 1970s. Since then, the status of this elusive rodent was shrouded in mystery. In 2007, an extraordinary photograph of a carcass of this species came to the light from Hawizeh Marsh which was interpreted as concrete evidence of the species’ pers
We have studied the effect of gamma irradiation on the optical transmission, absorbance, absorption coefficient, and Urbach energy for (PMMA- doped red methyl) film deposited by using solvent casting method .The optical transmission (T %) in the wavelength range (1901100 ) nm of films was measured , it was seen that all the parameters were affected by gamma irradiation.
An experimental and numerical investigation of the effect of using two types of nanofluids with suspending of (Al2O3 and CuO) nanoparticles in deionized water with a volume fraction of (0.1% vol.), in addition to use three types of fin plate configurations of (smooth, perforated, and dimple plate) to study the heat transfer enhancement characteristics of commercial fin plate heat sink for cooling computer processing unit. All experimental tests under simulated conditions by using heat flux heater element with input power range of (5, 16, 35, 70, and 100 W). The experimental parameters calculated are such as water and nanofluid as coolant with Reynolds number of (7000, 8000, 9400 and 11300); the air
... Show More