Preferred Language
Articles
/
jcopolicy-593
Alternative Perspectives in Explaining the Conduct of US Foreign Policy: A Historical-Critical View of Decision-Making Models
...Show More Authors

Receipt date:2/17/2021 acceptance date:3/16/2021 Publishing date:12/31/2021

Creative Commons LicenseThis work is licensed under a Creative Commons Attribution 4.0 International License.

Objective: This paper investigates the contradictions in the decision-making process of the United States, which historically proven to be successful policies in the short term, but in the long term proven to be wanting and failure. Methodology: The paper uses descriptive, historical, comparative method. Also, the paper proposes four models to examine the decision-making process and how it differs in the short term and the long term. The models are: 1. Individual and rational model (Model I); 2. Organizational and groupthink model (Model II); 3. Governmental and bureaucratic model (Model III); 4. Communication and information model (Model IV). Results: the study shows that Models I and IV are among the major explanatory factors for the failure of the US decision-making process in the long term. Conclusion: the study concludes that there is contradictions in the decision-making process of the United States in the long term versus the short term, the proposed four models, previously mentioned, show that Models I and IV that could speak to such contradiction and failure in the short term. However, synthesizing all of the models is critical in understanding and explaining the conduct of the US decision-making process.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 15 2023
Journal Name
Journal Of Robotics
A New Proposed Hybrid Learning Approach with Features for Extraction of Image Classification
...Show More Authors

Image classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Trends of poetic purposes towards praise: Dabal al-Khuzai's poetry is a model
...Show More Authors

Poetic objects may go towards a specific purpose and dissolve and interact with them to produce
A purpose characterized by the title but belongs to the U from afar.
The yarn goes towards praise with a purely horizontal relationship that mentions virtues but crowns them towards women.
In lamentation remember the virtues but crown them towards the dead.
In wisdom remember the virtues but crown them towards time.
In the description remember the virtues but crown them towards nature. All objects are inline
Horizontal We will prove this in the axes of research has required the plan to be a blind, five
The preamble, a brief overview of the life of Dabal All Khuzaie and the works and poets of the first axis
The direction

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 04 2023
Journal Name
Russian Journal Of General Chemistry
Synthesis and Characterization of Metals Complexes with Uracil and Uracil Derivatives (A Review)
...Show More Authors

Previous studies on the synthesis and characterization of metal chelates with uracil by elemental analysis, conductivity, IR, UV-Vis, NMR spectroscopy, and thermal analysis were covered in this review article. Reviewing these studies, we found that uracil can be coordinated through the electron pair on the N1, N3, O2, or O4 atoms. If the uracil was a mono-dentate ligand, it will be coordinated by one of the following atoms: N1, N3 or O2. But if the uracil was bi-dentate ligand, it will be coordinated by atoms N1 and O2, N3 and O2 or N3 and O4. However, when uracil forms complexes in the form of polymers, coordination occurs through the following atoms: N1 and N3 or N1 and O4.

Preview PDF
Scopus (45)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Al-nahrain University
SEPARATION AND IDENTIFICATION OF NAPHTHALENE, ACENAPHTHYLENE, PYRENE, BENZ{A} ANTHRACENE AND 1,3,2,4-DIBENZANTHRACENE
...Show More Authors

Reverse Phase High Performance Liquid Chromatography (RP-HPLC) was coupled with ultraviolet absorption sepectoscopy (UV) for separation and identification of Naphthalene, Acenaphthylene, Pyrene, Benz{a} anthracene and 1,3,2,4-Dibenzanthracene. RP-HPLC was performed on an ODS-C18 column (150×4.6 mm I.D) using acetonitrile–buffer phosphate as mobile phase. UV absorption spectra of the elutes was detected in 254 nm, and studying the chromatographic variables include organic modifier ratio, PH, column temperature and concentration of buffer to maximize resolution and minimize separation time. the results showed that using mobile phase( 80:20) v/v acetonitrile:0.01M phosphate buffer solution at PH 6 with flow rate 1ml/min and column te

... Show More
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering
Removal of Cadmium from Simulated Wastewaters Using a Fixed Bed Bio-electrochemical Reactor
...Show More Authors

In this research, the removal of cadmium (Cd) from simulated wastewater was investigated by using a fixed bed bio-electrochemical reactor. The effects of the main controlling factors on the performance of the removal process such as applied cell voltage, initial Cd concentration, pH of the catholyte, and the mesh number of the cathode were investigated. The results showed that the applied cell voltage had the main impact on the removal efficiency of cadmium where increasing the applied voltage led to higher removal efficiency. Meanwhile increasing the applied voltage was found to be given lower current efficiency and higher energy consumption.  No significant effect of initial Cd concentration on the removal efficiency of cadmium b

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Mon Jan 25 2021
Journal Name
Engineering And Technology Journal
Performance evaluation of Photovoltaic Panels by a Proposed Automated System Based on Microcontrollers
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Heliyon
Ground effect of an inverted double element wing diffuser on a sedan car
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref