Preferred Language
Articles
/
jcopolicy-593
Alternative Perspectives in Explaining the Conduct of US Foreign Policy: A Historical-Critical View of Decision-Making Models
...Show More Authors

Receipt date:2/17/2021 acceptance date:3/16/2021 Publishing date:12/31/2021

Creative Commons LicenseThis work is licensed under a Creative Commons Attribution 4.0 International License.

Objective: This paper investigates the contradictions in the decision-making process of the United States, which historically proven to be successful policies in the short term, but in the long term proven to be wanting and failure. Methodology: The paper uses descriptive, historical, comparative method. Also, the paper proposes four models to examine the decision-making process and how it differs in the short term and the long term. The models are: 1. Individual and rational model (Model I); 2. Organizational and groupthink model (Model II); 3. Governmental and bureaucratic model (Model III); 4. Communication and information model (Model IV). Results: the study shows that Models I and IV are among the major explanatory factors for the failure of the US decision-making process in the long term. Conclusion: the study concludes that there is contradictions in the decision-making process of the United States in the long term versus the short term, the proposed four models, previously mentioned, show that Models I and IV that could speak to such contradiction and failure in the short term. However, synthesizing all of the models is critical in understanding and explaining the conduct of the US decision-making process.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2016
Journal Name
Radiology Case Reports
Intralobar pulmonary sequestration in elderly woman: a rare case report with emphasis on imaging findings
...Show More Authors

View Publication
Scopus (7)
Crossref (10)
Scopus Crossref
Publication Date
Sun Apr 03 2011
Journal Name
لمؤتمر العلمي الرابع لكلية التربية/ جامعة سامراء
A comparison between alanine aminopeptidase (AAP) activity in type 2 diabetes and diabetic cardiac patients.
...Show More Authors

Publication Date
Mon May 01 2017
Journal Name
2017 24th International Conference On Telecommunications (ict)
Load balancing by dynamic BBU-RRH mapping in a self-optimised Cloud Radio Access Network
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Sun Jun 05 2022
Journal Name
Network
A Computationally Efficient Gradient Algorithm for Downlink Training Sequence Optimization in FDD Massive MIMO Systems
...Show More Authors

Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Mechanical Engineering Research And Developments
Numerical investigation for Natural Convection in a square Enclosure with partially active thermal sides' wall
...Show More Authors

Three-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.

Scopus
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Gravity Field Interpretation for Major Fault Depth Detection in a Region Located SW- Qa’im / Iraq
...Show More Authors

This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Mar 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using Elastic Properties as a Predictive Tool to Identify Pore-Fluid Type in Carbonate Formations
...Show More Authors

The aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Al-mustansiriyah Journal Of Science
CA72-4 as a Promising Prognostic and Diagnostic Biomarker in Iraqi Patients with Colorectal Cancer
...Show More Authors

Colorectal cancer (CRC), the second most fatal cancer and the 3rd most common cancer is expected to cause 0.9 million deaths globally in 2025. Carcinoembryonic antigen (CEA) is currently used in the follow-up of patients with colorectal cancer, and in this study, we are trying to find a better marker than CEA in following up on patients' health and knowing the effectiveness of the treatment used and as a diagnostic marker for colorectal cancer. To determine the significance of Cancer antigen 72-4 (CA72-4) as a prognosis predictor in patients with colorectal cancer, compare its prognostic validity to the CEA biomarker. this case-control study includes (150) participants, 100 patients (59 males and 41 females), and 50 healthy controls

... Show More
View Publication
Crossref (1)
Crossref