Wars represent one of the most serious threats to the world order; It is considered a violation of international laws and norms, and humanitarian principles. From this point comes the study of the importance of the topic entitled (The Future of the Russian-Ukrainian war and the extent of its Reflection on the security of Eastern European countries after the year 2022). This study is based on reviewing future possibilities (scenarios) of war. The Russian-Ukrainian war, which was launched by the Russian government led by Russian President Vladimir Putin in February 2022, is still ongoing at the time of writing this research. This chapter includes three possibilities (scenarios). The first possibility deals with the development of the war to dangerous levels, and this possibility is unlikely. Because both sides of the conflict (the West and Russia) possess nuclear deterrence. While the second possibility deals with the continuation of the war, this is also unlikely because history has proven that every war has an end, even if it is somewhat long, but it will inevitably end. The third possibility deals with a solution to end the war, which is likely and is expected to satisfy Russia because Russia will not accept withdrawal without compensation or keeping the areas controlled by Russia and to which they are annexed. These are the expected possibilities (scenarios) in the Russian-Ukrainian war.
In this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using
The problematic of the current research marked (style between alienation and westernization in contemporary painting) is demonstrated by the fact that the stylistic forms in art are full of the influx of subjective and emotional impressions, as well as administrative and borrowing techniques, as well as their contextual meaning, whether cultural, social and political, which gives them an alien dimension at one time or another. The aim of the research is: Define the style between alienation and alienwesternization in contemporary painting. The research included six axes dealing with the first axis: an introduction to the concept of alienation, and the second axis dealing with the style in romanticism. The third dealt with: the method in i
... Show MoreBackground: The protective roles of vitamin C and total proteins in gingival inflammation were reported by several studies. The aim of this study was to measure the concentration of salivary vitamin C, total protein and their relation to gingival health among dental students. Materials and methods: The sample consisted of 67 dental students (33 males and 34 females) from College of Dentistry, University of Baghdad. Sillness and Löe (1964) was used for recording of dental plaque, while the gingival index (GI) was measured according to Löe and Sillness criteria (1963). Stimulated salivary samples were collected and chemically analyzed in Poisoning Center/Surgical Specialty Hospital by using colorimetric method to measure the salivary v
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreCitric acid is an essential ingredient for the manufacture of (12) key industrial chemicals. Citric acid use is increasing steadily with a high annual growth rate as a result of the development of ever more sophisticated applications. Citric acid is widely utilized in the food and pharmaceutical industries due to its low toxicity when compared to other acidulous. Other uses for citric acid can be found in cleaning supplies and detergents. Based on information from a review of the literature, Citric acid production substrates and methods for surface fermentation, submerged fermentation, solid-state fermentation, and international market expansion are all covered in the current review study. Finally, there is still much to learn about the
... Show MoreAbstract
Travel Time estimation and reliability measurement is an important issues for improving operation efficiency and safety of traffic roads networks. The aim of this research is the estimation of total travel time and distribution analysis for three selected links in Palestine Arterial Street in Baghdad city. Buffer time index results in worse reliability conditions. Link (2) from Bab Al Mutham intersection to Al-Sakara intersection produced a buffer index of about 36% and 26 % for Link (1) Al-Mawall intersection to Bab Al- Mutham intersection and finally for link (3) which presented a 24% buffer index. These illustrated that the reliability get worst for link
... Show MoreThe aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show More