Abstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emphasizing the emergency of existential threat as it would affect both physical and moral existence of EU security reference whether at individual group, state or identity levels. That ‘s why exceptional arrangements of securing that reference under threat must be pursued which turned to be named in the political and security literature as securitization of clandestine immigration
The No Mobile Phone Phobia or Nomophobia notion is referred to the psychological condition once humans have a fear of being disconnected from mobile phone connectivity. Hence, it is considered as a recent age phobia that emerged nowadays as a consequence of high engagement between people, mobile data, and communication inventions, especially the smart phones. This review is based on earlier observations and current debate such as commonly used techniques that modeling and analyzing this phenomenon like statistical studies. All that in order to possess preferable comprehension concerning human reactions to the speedy technological ubiquitous. Accordingly, humans ought to restrict their utilization of mobile phones instead of prohibit
... Show MoreFaith is a feature of the Mesopotamian population, since the ancient Mesopotamian was a believer and obedient to his God in any case, and this encouraged the emergence of some of the phenomena interpreted by historians as an integral part of the civilization and ancient history of this country, and these phenomena are the phenomena of the deification of kings for themselves, The first phenomenon was a personal endeavor for the uniqueness of power, sometimes to correct some mistakes in societies to balance the state, and civil rule is independent of religious rule, and the second was the result of divination and predictions of omen, in the case of any bad harbinger of the king, such as the occurrence of eclipse To the sun or a lunar eclip
... Show MoreAfter this systematic presentation of the phenomenon of rotation of formulas, ie the construction of the verb and the verb, and the narrated narratives therein differed among the readers, it became clear to us how the difference was clear between reading and the other, and how readers have varied in their readings of the verb, As we have noted through our modest research that the phenomenon of building the verb for the actor and the effect have included the act of both past and present tense, and not limited to a specific time, and this difference in reading was not limited to a particular environment, but beyond To more than one environment This is evidenced by the readings of various readers from the environment of Kufa, Basra, Mecca,
... Show MoreThe arrival of Russian President Vladimir Putin to power in the Russian Federation is an important factor in delineating a new approach to Russian policy towards regions that have great strategic importance affecting its national security. Therefore, NATO's progress eastward towards these regions prompts Russia to delineate a new strategy to confront this progress as well as preserving its control in the near neighboring regions represented by the countries of Eastern Europe, especially after the changes that occurred in those regions following the color revolutions that swept the region, such as the first application of this Russian policy in 2014, through the annexation of Crimea, and the latest military operations in Ukraine i
... Show MoreThe provision of safe water for people is a human right; historically, a major number of people depend on groundwater as a source of water for their needs, such as agricultural, industrial or human activities. Water resources have recently been affected by organic and/or inorganic contaminants as a result of population growth and increased anthropogenic activity, soil leaching and pollution. Water resource remediation has become a serious environmental concern, since it has a direct impact on many aspects of people’s lives. For decades, the pump-and-treat method has been considered the predominant treatment process for the remediation of contaminated groundwater with organic and inorganic contaminants. On the other side, this tech
... Show MoreThe intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show MoreThe problem of this research is:
What are the sustainable development goals that received the priority in the press addressing of the newspapers under study?
What are the journalistic arts adopted by these newspapers in addressing the sustainable development goals?
What are the journalistic sources that Arab newspapers depended on when addressing the sustainable development goals?
What are the geographic range the Arab newspapers adopted in addressing the sustainable development goals? The research is categorized into descriptive research, adopting the survey method, and using the content analysis method.
The sample of research was determined by the preparation of the Arabic newspapers (Al-
... Show MoreRegulations of changes in Sharia policy
Variables include jurisprudential rulings that may be subject to change, alteration and interpretation, depending on the mujtahid’s view of the ruling, or changing it and switching to another view, and the variables are the crucial issues that befell the nation of Islam. It was not neglected by Islamic legislation, but rather the setting of controls that took into account in every incident the norms, interests and purposes.
Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulated und
... Show MoreDetecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show More