Preferred Language
Articles
/
jcopolicy-582
(The role of the Security Council in Managing international crises (The Libyan crisis as a model
...Show More Authors

The Security Council has an active role in addressing international crises and dealing with their causes. The Libyan crisis is one of the most important real tests of the Security Council and its role in maintaining international peace and security, as the Council has proven so far an ineffective role in resolving the crisis and dealing withtheir causes, which has prolonged its duration and increased its complexities and dangerous repercussions, perhaps the most prominent of which is the threat of the recently achieved cease-fire and the formation of a new transitional government led by Abdel Hamid al-Dabaiba, the growing significant obstacles facing the political process, foremost of which is the continued presence of foreign forces , mercenary forces, and the failure of the Libyan parties to achieve consensus on the components of the political map. In it. It affirms its support for the Presidential Council and the transitional government, and calls for the unification of security and military institutions, agreement on constitutional rules, and the need to hold fair and free elections on time. Thus, although the Council identifies the obstacles and causes of the Libyan crisis and the obstacles to progress in the road map, it does not take practical measures that would enable it to play an effective and real role, as it remains within the framework of general treatments based on appeals and demands through non-binding presidential statements, which negatively affectes the crisis led to its complexity.

Undoubtedly, the game of interests is an attempt to limit the influence of other major countries involved in this conflict, and for this the Council failes because of the use of the veto right by those major countries that defend their interests and do not primarily defend the Libyan interest, which requires achieving stability and Libyan community peace

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2024
Journal Name
Results In Chemistry
Microwave synthesis, density functional theory study and antiproliferative activity of the novel spiropyrazole derivatives
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Colloid And Interface Science
Impact of nanoparticles on the CO2-brine interfacial tension at high pressure and temperature
...Show More Authors

Hypothesis Nanofluid flooding has been identified as a promising method for enhanced oil recovery (EOR) and improved Carbon geo-sequestration (CGS). However, it is unclear how nanoparticles (NPs) influence the CO2-brine interfacial tension (γ), which is a key parameter in pore-to reservoirs-scale fluid dynamics, and consequently project success. The effects of pressure, temperature, salinity, and NPs concentration on CO2-silica (hydrophilic or hydrophobic) nanofluid γ was thus systematically investigated to understand the influence of nanofluid flooding on CO2 geo-storage. Experiments Pendant drop method was used to measure CO2/nanofluid γ at carbon storage conditions using high pressure-high temperature optical cell. Findings CO2/nano

... Show More
Scopus (80)
Crossref (81)
Scopus Clarivate Crossref
Publication Date
Fri May 25 2018
Journal Name
Open Public Health Journal
Comparative Study on the Clinicopathological Profiles of Breast Cancer Among Iraqi and British Patients
...Show More Authors

Background: Breast cancer is the most common cancer in Iraq and the United Kingdom. While the disease is frequently diagnosed among middleaged Iraqi women at advanced stages accounting for the second cause of cancer-related deaths, breast cancer often affects elderly British women yielding the highest survival of all registered malignancies in the UK. Objective: To compare the clinical and pathological profiles of breast cancer among Iraqi and British women; correlating age at diagnosis with the tumor characteristics, receptor-defined biomarkers and phenotype patterns. Methods: This comparative retrospective study included the clinical and pathological characteristics of (1,940) consecutive female patients who were diagnosed with invasive b

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (15)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Modeling and Simulation of Cadmium Removal from the Groundwater by Permeable Reactive Barrier Technology
...Show More Authors

The removal of cadmium ions from simulated groundwater by zeolite permeable reactive barrier was investigated. Batch tests have been performed to characterize the equilibrium sorption properties of the zeolite in cadmium-containing aqueous solutions. Many operating parameters such as contact time, initial pH of solution, initial concentration, resin dosage and agitation speed were investigated. The best values of these parameters that will achieved removal efficiency of cadmium (=99.5%) were 60 min, 6.5, 50 mg/L, 0.25 g/100 ml and 270 rpm respectively. A 1D explicit finite difference model has been developed to describe pollutant transport within a groundwater taking the pollutant sorption on the permeable reactive barrier (PRB), which i

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (18)
Crossref
Publication Date
Thu May 05 2022
Journal Name
Journal Of Taibah University For Science
Innovative economic anthocyanin dye source for enhancing the performance of dye-sensitized solar cell
...Show More Authors

View Publication
Scopus (11)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon May 06 2024
Journal Name
Journal Of Ecological Engineering
Using Machine Learning Algorithms to Predict the Sweetness of Bananas at Different Drying Times
...Show More Authors

The consumption of dried bananas has increased because they contain essential nutrients. In order to preserve bananas for a longer period, a drying process is carried out, which makes them a light snack that does not spoil quickly. On the other hand, machine learning algorithms can be used to predict the sweetness of dried bananas. The article aimed to study the effect of different drying times (6, 8, and 10 hours) using an air dryer on some physical and chemical characteristics of bananas, including CIE-L*a*b, water content, carbohydrates, and sweetness. Also predicting the sweetness of dried bananas based on the CIE-L*a*b ratios using machine learn- ing algorithms RF, SVM, LDA, KNN, and CART. The results showed that increasing the drying

... Show More
Preview PDF
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Corporate Governance And Organizational Behavior Review
Impact of the electronic internal auditing based on IT governance to reduce auditing risk
...Show More Authors

This paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D

... Show More
View Publication
Scopus (42)
Crossref (24)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
The Response of Reinforced Concrete Composite Beams Reinforced with Pultruded GFRP to Repeated Loads
...Show More Authors

This paper investigates the experimental response of composite reinforced concrete with GFRP and steel I-sections under limited cycles of repeated load. The practical work included testing four beams. A reference beam, two composite beams with pultruded GFRP I-sections, and a composite beam with a steel I-beam were subjected to repeated loading. The repeated loading test started by loading gradually up to a maximum of 75% of the ultimate static failure load for five loading and unloading cycles. After that, the specimens were reloaded gradually until failure. All test specimens were tested under a three-point load. Experimental results showed that the ductility index increased for the composite beams relative to the refe

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Computing
Twitter Location-Based Data: Evaluating the Methods of Data Collection Provided by Twitter Api
...Show More Authors

Twitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref