Abstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under equipped blue helmets have struggled to carry out ambitious mandates while facing severe challenges in the Central African Republic, Mali, South Sudan and elsewhere, only thinly papered over by the international responses to date.
Background: Nicotine is the foremost chemical constituent responsible for addiction in tobacco products, in the non-ionized condition can be easily absorbed via epithelial tissue of the lung, the mouth, the nose and across the skin
Objective:The study examines the harmful effect of the nicotine which is an important component of cigarette in vitro.
Type of the study: Cross-sectional study.
Methods: Examines the harmful effect of the nicotine which is an important component of cigarette in vitro by using two types of lung cancer cell lines (H460 TP53+/+, H441 TP53-/-).
Background: Analysis of human reports and comparison with results of experimental animals indicate that the effects of progesterone on human not analogous to experimental animals fetus, many studies showed that exposure to progesterone during developing of genital tract of human fetus was not teratogenic. Other studies which performed on laboratory animals found association between progesterone administration during gestation and genital malformation. Objectives: to explore the effect of progesterone in 10.2 mg/kg intraperitoneal injection in mice on testis development and anogenital distance. Materials and Methods: ten pregnant mice divided into five mouse control group that injected10. 2mg/kg sesame oil and treated group that injected pro
... Show Morethe rationalization of energy consumption Require awareness in the possibility of bridging the local need severe shortage of electric power for daily requirements. The research aims to show that the engineers of various specializations and architects, including in particular can have an active role in about the importance of the role of energy in human life, and it’s best utilization without extravagance (which our religion forbids it). Here lies the problem of the research to find possible means and alternative methods to reduce (rationalization) electrical energy consumption in hot dry areas in general which need large energy for air conditioning because of the crucial climate of these regions that making access to the area o
... Show MoreThe breakfast key components of good nutrition and a large proportion of pupils to Ataatnol her breakfast at home and increase the failure rate breakfast increase the child's age research aims to study the importance of breakfast and emphasize the need to contain aggregates of basic food and its relationship to the curriculum daily diet and its impact on the balance of proteins, fats in food daily as well as the effect of some relevant factors such as the mother's level of education and the number of family members and summarized the most important results in that the percentage of 15.6% Neglected children eating breakfast as well as afternoon that Almaah percentages of calories coming from protein and fat at breakfast .....
In this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.
The importance of this research lies in developing a psychological expenditure scale and its relationship to the passing skills of specialized volleyball players. The research problem focused on psychological expenditure as one of the problems and challenges faced by specialized players and its negative impact, such as poor skill performance, which is reflected in the performance of the player and the team. This weakens the player's self-confidence and concentration and affects the team's performance in tournaments as well as their performance in training. The research aims to develop a psychological expenditure scale, and the researcher used the descriptive approach as it is appropriate for the nature of the research problem. The f
... Show MoreInfrastructure, especially wastewater projects, plays an important role in the life of residential communities. Due to the increasing population growth, there is also a significant increase in residential and commercial facilities. This research aims to develop two models for predicting the cost and time of wastewater projects according to independent variables affecting them. These variables have been determined through a questionnaire distributed to 20 projects under construction in Al-Kut City/ Wasit Governorate/Iraq. The researcher used artificial neural network technology to develop the models. The results showed that the coefficient of correlation R between actual and predicted values were 99.4% and 99 %, MAPE was
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More