Nations witnessed since its existence a state of wills conflict as a result of the intersection and intertwining of interests, through which it sought to achieve its goals and objectives, and this has often led to direct military conflicts and countless wars, and witnessed the entry into global wars in which humanity lost millions of lives and losses .Despite the great changes in the international arena, especially in recent decades, the conflict of wills has not ceased, although some of its features and forms have changed, and it has become more complicated after the withdrawal of this conflict to international organizations and bodies, including the Security Council. It is mandated under the Charter of the United Nations to work for achieving international peace and security through the consensus of the permanent states and the issuance of effective resolutions to resolve the problems and issues before it, as the features of the conflict of wills between the member states in the discussions of the Syrian crisis have clearly emerged, which hindered the Council's ability to address them and caused them to continue for several years .It was reflected on more losses and even greater complexity of the situation.
البيروني مؤلف عربي، أصله فارسي ، رحل للهند ودرس لغتها وثقافتها وديانتها، نبغ في كثير من العلوم فأضحى مؤرخاً ولغوياً وأدبياً وعالماً بالرياضيات والطبيعيات والفلك والطب والفلسفة والتصوف والأديان ، ولهُ بتلك العلوم مصنفات قيمة تمتاز بالبحث الدقيق والإحاطة الشاملة ، وسائل في المعادن والتنجيم، كما له مراسلات وموازنات قيمة بين المذاهب الفلسفية والصوفية عند الهند والمسيحيين والمسلمين
Современные исследователи газетного речи много пишу об активном использовании разговорной и даже разговорно-сниженной, жаргонной лексики в общественно-политической публицистике. Это вызвано тем, что «…в силу того контраста, который невольно возникает при соприкосновении разговорных элементов с привычно книжными словами и построениями языка газеты, они были сразу осмыслены как сильное средство созд
... Show MoreHand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show Moreتناول هذا البحث الدور الحيوي الذي تؤديه المراكز البحثية في دعم القضايا الاجتماعية، مع التركيز على مركز دراسات المرأة في جامعة بغداد كنموذج تطبيقي. يوضح الباحث أن هذه المراكز لا تقتصر على إنتاج المعرفة النظرية، بل تسهم بشكل مباشر في معالجة التحديات المجتمعية، من خلال تقديم رؤى تحليلية ومقترحات عملية لصناع القرار. كما ويسلط الضوء على مساهمة مركز دراسات المرأة في تعزيز المشاركة السياسية للمرأة العراقية، خاصة
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreObjective: The aim of this study was to compare the marginal microleakage between bulk-fill, preheated bulk-fill, and bulk-fill flowable composite resins above and below cemento-enamel junction (CEJ) using micro-computed tomography. Methods: Sixty freshly extracted premolar teeth were prepared with a slot shaped cavities of a total of 120 Class II: 3mm (bucco-lingual), 2mm (mesio-distal) with mesial-gingival margin located 1mm coronal to CEJ, and distal gingival margin located 1mm apical to the CEJ. The samples were randomly divided into two main groups according to the restorative material (Tetric EvoCeram and 3M Filtek), and each group was further sub-divided into three subgroups according to the consistency (bulk fill, preheated bulk fil
... Show MoreBackground: With the increasing demands for adult orthodontics, a growing need arises to bond attachments to porcelain surfaces. Optimal adhesion to porcelain surface should allow orthodontic treatment without bond failure but not jeopardize porcelain integrity after debonding.The present study was carried out to compare the shear bond strength of metal bracket bonded to porcelain surface prepared by two mechanical treatments and by using different etching systems (Hydrofluoric acid 9% and acidulated phosphate fluoride 1.23%). Materials and Methods: The samples were comprised of 60 models (28mm *15mm*28mm) of metal fused to porcelain (feldspathic porcelain). They were divided as the following: group I (control): the porcelain surface left u
... Show MoreThis study rigorously investigates three 3d transition metal carbide (TMC) structures via LDA and GGA approximations. It examines cohesive energy (Ecoh), Vickers hardness (Hv), mechanical stability, and electronic properties. Notably, most 3d TMCs exhibit higher cohesive energy than nitrides, and rs-TiC demonstrates a Vickers hardness of 25.66 GPa, outperforming its nitride counterpart. The study employs theoretical calculations to expedite research, revealing mechanical stability in CrC and MnC (GGA) and CrC (LDA in cc structure), while all 3d TMCs in rs and seven in zb structures show stability. Charge transfer and bonding analysis reveal enhanced covalency along the series, influenced by the interplay between p orbitals of carbon and d o
... Show More