Preferred Language
Articles
/
jcopolicy-448
The Realist Case for Impeachment By Steven M.Walt
...Show More Authors

المقال منشور على موقع مجلة الفورين بوليسي الأميركية (Foreign Policy) على الانترنت في 27 أيلول/سبتمبر 2019. يُشير مصطلح العزل (Impeachment) في الثقافة السياسية الأميركية إلى مجموعة الإجراءات التي يتم بموجبها عزل الرئيس من منصبه، وهذه الإجراءات هي بمثابة عملية طويلة تجري داخل الكونجرس، وتتم وفقاً لخطوات يؤدي فيها كل من مجلسيّ النواب والشيوخ دوراَ. ولا يعني القيام بهذه الإجراءات أن يتم عزل الرئيس، فقد تتم إجراءات العزل، لكن قد تكون نتيجتها النهائية عدم الوصول إلى قرار بعزل الرئيس وإقصائه عن المنصب. ولم تُكلل إجراءات العزل التي بدأت في تاريخ الولايات المتحدة لعزل الرؤساء ("أندروجونسون" في عام 1868، و"ريتشارد نيكسون" في 1974، و"بيلكلينتون" في عام 1998 ) بالنجاح لأسباب مختلفة. (المترجمة نقلاً عن https://futureuae.com/ar-AE/Mainpage/Item/4402/impeachment )

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Planner And Development
The Rehabilitation Use for Urban Heritage Fabric
...Show More Authors

The study of the characteristics of the heritage fabric is one of the important things in studies of conservation and rehabilitative use. There are three main elements of rehabilitation and they are considered the basis for achieving the rehabilitation process and these elements are (development, sustainability, participation) and that the first item addressed in the research is heritage and urban fabric in heritage areas where characteristics have been studied And a problem, while the second term is rehabilitation, where the concept of rehabilitation, the types and causes of the process of rehabilitation and the benefits and qualifications that affect the urban fabric that are represented (social, economic, religious and political) were

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Methods for Estimating the Survival Function and Failure Rate for the Exponentiated Expanded Power Function Distribution
...Show More Authors

 

     We have presented the distribution of the exponentiated expanded power function (EEPF) with four parameters, where this distribution was created by the exponentiated expanded method created by the scientist Gupta to expand the exponential distribution by adding a new shape parameter to the cumulative function of the distribution, resulting in a new distribution, and this method is characterized by obtaining a distribution that belongs for the exponential family. We also obtained a function of survival rate and failure rate for this distribution, where some mathematical properties were derived, then we used the method of maximum likelihood (ML) and method least squares developed  (LSD)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
السياسة الضريبية المحلية في ظل العولمة ( مع إشارة خاصة لالسياسة الضريبية المحلية في ظل العولمة ( مع إشارة خاصة لبلدان جنوب شرق آسيا)بلدان جنوب شرق آسيا)
...Show More Authors

تركت العولمة المتسارعة أثرا عميقا على مدى واسع من السياسات والتطبيقات الاقتصادية في كل من الدول النامية والمتقدمة على حد سواء, إذ نشأت الأنظمة الضريبية الحالية عندما نمّط كل بلد سياسته الضريبية بشكل تركز معه على متطلبات الاقتصاد المحلي, وعندما كانت تعقد المفاوضات بين الأمم المختلفة حول المعاملات الضريبية والاتفاقات الضريبية كانت تجري في إطار من هيمنة السياسة الضريبية المحلية.

لكن العولم

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
ANALYSIS OF GEOTEXTILE EMBANKMENT BY ANSYS
...Show More Authors

The major objectives of this research are to analyze the behavior of road embankments
reinforced with geotextiles constructed on soft soil and describe the finite element analysis by using
ANSYS program ver. (5.4). The ANSYS finite element program helps in analyzing the stability of
geo- structure (embankment) in varied application of geotextiles reinforcement to enhance the best
design for embankment.
The results of analysis indicate that one of the primary function of geotextiles reinforcement was to
reduce the horizontal displacement significantly. With the inclusions of reinforcement, the horizontal
displacement reduced by about (81%), while the vertical displacement reduced by (32%). The effect
of geotextiles

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 30 2025
Journal Name
Al-nahrain Journal Of Science
INTRUSION WINDOWS XP BY BACKDOOR TOOL
...Show More Authors

View Publication
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Dewatering System Control by MATLAB Software
...Show More Authors

The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
WISDOM AND ITS CAUSE BY FUNDEMENTALISTS
...Show More Authors

Allah's wisdom has necessitated concentrating un human nature the ability of
mediation and forethought .among the aspect of this ability is the recognition of the
relationship between causes and effects issues and reasons behind them and the
sensing of similarities and differences and distinguish the connection between the
subjects and characteristics and the innate perception of material and immaterial good
and bad.
Allah's wisdom has willed not to make his law away from the nature of people of
discovering the relationship between things and their causes, or similarity between
things and their counterparts to use the Quranic text to convince reason and to enable
reason to realize the wisdom quranic text within

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 30 2025
Journal Name
Journal Of Engineering
Drag Reduction by using Anionic Surfactants
...Show More Authors

View Publication
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF