Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their basic needs,altimitly means a decent living and freedom and the end for , and it supposed for most respect for human rights through democratic framework.
The harmonic oscillator (HO) and Gaussian (GS) wave functions within the binary cluster model (BCM) have been employ to investigate the ground state neutron, proton and matter densities as well as the elastic form factors of two- neutron 6He and 16C halo nuclei. The long tail is a property that is clearly revealed in the density of the neutrons since it is found in halo orbits. The existence of a long tail in the neutron density distributions of 6He and 16C indicating that these nuclei have a neutron halo structure. Moreover, the matter rms radii and the reaction cross section (𝜎𝑅 ) of these nuclei have been calculated using the Glauber model.
4-amino-3-(4-(((4-hydroxy-3, 5dimethoxybenzyl) oxy) methyl) phenyl)-1, 2, 4-triazole-5-thione was synthesized by to method the first one from melt reaction of 4-(((4-hydroxy-3, 5-dimethoxybenzyl) oxy) methyl) benzoic acid with Thiocarbonyldihydrazide, the second method from convert the corresponded acid hydrazide to potassium 2-(4-(((4-hydroxy-3, 5-dimethoxybenzyl) oxy) methyl) benzoyl) hydrazinecarbodithioate salt then react with hydrazine hydrate. Newly Schiff base (7a-7f) were synthesized from reaction the 4-amino-1, 2, 4-triazol with substituted hydroxybenzaldehyde. The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2, 2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays
... Show MoreThis paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and t
... Show MoreThe background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art
... Show MoreFor a mathematical model the local bifurcation like pitchfork, transcritical and saddle node occurrence condition is defined in this paper. With the existing of toxicity and harvesting in predator and prey it consist of stage-structured. Near the positive equilibrium point of mathematical model on the Hopf bifurcation with particular emphasis it established. Near the equilibrium point E0 the transcritical bifurcation occurs it is described with analysis. And it shown that at equilibrium points E1 and E2 happened the occurrence of saddle-node bifurcation. At each point the pitch fork bifurcation occurrence is not happened.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show Moretotal of 17 Escherichia coli isolates were collected from urine specimens of patients with urinary tract infection. Antibiotics sensitivity test indicated that amikacin followed by chloramphenicol and ciprofloxacin are the most effective antibiotics. The isolates showed multidruge resistant, nine isolates were resistant to 11-15 antibiotics, 3 were resistant to 16-20 antibiotics and 5 were resistant to 21-25 antibiotic. Two isolates were selected, the first (ED1) was resistant to (22) antibiotics while the second isolate (ED2) was resistant to (14) antibiotics (out of 25). Minimum inhibitory concentration (MIC) of the black and green tea water boiled extracts were determined towards (ED1,ED2).Results showed that MIC of black tea extr
... Show More