The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and assumptions
المستخلص
تتميز هذه الورقة بتناولها موضوعاً يخشى الكثيرون الخوض فيه للملابسات الدائرة حوله، وهو اصحاب المصالح كموضوع مهم في الفكر الستراتيجي. فخاضت في مفاهيمه العامة وتصنيفاته ومنظوراته، ووجدت في مفهومه بأنهم اولئك الذين يمكن تمثيلهم بالمجاميع او الوحدات المستقلة التي ترتبط بمنظمة الاعمال عبر شبكة علاقات مؤثرة مختلفة الابعاد والاتجاهات، واذا ما حدث أي خلل في توازن هذه العلاقات، قد ت
... Show MoreThe object of this study is to establish a global model to use of DeNovo programming the strategies of multi-Decision making process in the city of Baghdad.
Thus, we have chosen an important and an effective subject in the life of the citizen due to the importance of this subject in the Iraqi citizen of luck of water and for many reasons.
In this thesis, we have tackled the establishment of a global model to be able to reach solution or an alternative model a money the available alternative.
The alternative proposed here utilizes the application of the (DeNovo) programming approach suggested by (1982) in solving t
... Show MoreTwo simple methods for the determination of eugenol were developed. The first depends on the oxidative coupling of eugenol with p-amino-N,N-dimethylaniline (PADA) in the presence of K3[Fe(CN)6]. A linear regression calibration plot for eugenol was constructed at 600 nm, within a concentration range of 0.25-2.50 μg.mL–1 and a correlation coefficient (r) value of 0.9988. The limits of detection (LOD) and quantitation (LOQ) were 0.086 and 0.284 μg.mL–1, respectively. The second method is based on the dispersive liquid-liquid microextraction of the derivatized oxidative coupling product of eugenol with PADA. Under the optimized extraction procedure, the extracted colored product was determined spectrophotometrically at 618 nm. A l
... Show MoreThe sentence is one building unit in a music that has a full meaning which in the end takes a long silence .The sentence bases made the sentences with intransitive verb ( non connection ) and the sentences are made with general verb (connection ) .The sentence parts :Verbal sentence –supportive sentence , sentence without a verb .
The method of divide the sentence into these syntax units ( face division ) or (analysis and to each of the syntax units resulted from dividing the sentence to sections made to the end the characterizes the smaller syntax units ,the words .The method of analyze the surface structure of Persian language sentence is exchange method.  
... Show MoreThis research investigates modern linguistics in terms of the “universality” concept, through which linguistics shifted its attention from the description of the phenomenon into finding an interpretation of it. Then it investigates what needs interpretation in the language
This research investigates modern linguistics in terms of the “universality” concept, through which linguistics shifted its attention from the description of the phenomenon into finding an interpretation of it. Then it investigates what needs interpretation in the language
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show More