This research seeks to study the role of military bases in activating defense diplomacy, with a focus on studying the case of France in the African continent, which relied on its military bases as a tool to implement its foreign policy. The research explains the concept of defense diplomacy and its relationship to military bases as an effective tool to strengthening bilateral relations between the state's parties. The research focuses on studying the effectiveness of military bases as a tool for activating French defense diplomacy, and studying the goals that French foreign policy seeks to achieve through its intervention or presence in the African continent. In addition to the geopolitical reasons that prompted France to move towards the African continent and plant its military bases. In order to complete this study and achieve its objectives, it adopts the historical approach and the descriptive analytical approach to search documents and studies related to the interpretation of French political behavior in the African continent. The study concludes that France is keen to protect its interests and achieve its external goals by employing various tools, including defensive diplomacy represented in its military bases in the lands of other countries. It also concludes that the nature of the historical stage that France went through and the exploitation of its bases and military presence in implementing its higher interests at the expense of the African people led to the failure of French foreign policy in African countries
What distinguishes the athlete in dealing with all stimuli is the ability to understand the cognitive rules through which he acts and directs behavior through thinking and regular planning methods in dealing with the environment in a realistic manner, and this comes through techniques and means based on modernity in obtaining information that makes the athlete arrange in His memory is the programs that are the most important crutch for relying on when he asks for them in applying and executing the skill assignment. One of the enhancers of awareness of variables is the ability of coaches to provide openness in modern ideas to find solutions, through which the player can sense and interpret events and produce outputs for quick and successful
... Show MoreAutorías: Suhair Meteab Munaf, Ali Abdulateef Ali, Mohannad Salman Dawood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 4, 2022. Artículo de Revista en Dialnet.
The skin temperature of the earth’s surface is referred to as the Land Surface Temperature (LST). the availability of long-term and high-quality temperature records is important for various uses that affect people’s lives and livelihoods. Much valid information was provided to this research from remote sensing technology by using Landsat 8 (L8) imagery to estimate LST for Al-Ahdab oil field in Wasit city in Iraq. The aim of this research is to analyze LST variations based on Landsat 8 data for 2022 (January, April, July, and October). ArcMap 10.8 was used to estimate LST results. The results values ranged from (about 10 C in January to about 46 C in July). The results show that LS
An analytical and clinical study has been applied for measure the bioavailability of Zinc in serum of twenty adults healthy volunteers, using flame atomic absorption spectrophotometer (FAAS) at 213.9 nm. The calibration graph is linear in the ranges of 0.25-1.5 μg.mL-1 with correlation coefficient (R) 0.09996)μg.mL1-and molar absorpitivites 22957.76(L.mol1-cm-1.The concentration of Zinc determined in serum of all volunteers before and after administered orally a tablet of 50 mg zinc sulphate, produced by Samara drugs company (SDI). All data were subjected to statistical analysis by calculating accuracy, precision in addition to other parameters. The results indicate that the average maximum concentration (C-max ± SD) of blood zinc was 0.
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More