In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle East in favor of their organization. They tried to co-opt the jihad volunteers who traveled to Bosnia after the break-up of Yugoslavia in 1992 after the Bosnian army was able to contain them but ended up expelling them in the fall of 1995. A year later, al-Qaeda achieved greater success in supervising the training of Pakistani fighters who were smuggled into Kashmir to play a combat role In Afghanistan and elsewhere. Al-Qaeda members have also succeeded in excluding local supporters of Kashmir's independence and mixing the cards between national independence,
The MTS-88. c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to be erased and the system to stop responding. Also, this system lacks the ability to be connected to the PC. The aim of this work is to modify the system to make it possible to be connected to the PC through the parallel port. This gives the capability to download long programs to the system after being developed in the PC. The 8255 Programmable Peripheral Interface available in the teaching system is interfaced to the parallel port and used as
... Show MoreReinforced concrete barriers have been commonly used in protecting the important building because the response of R.C. barriers subjected to blast loading is practically more acceptable than other materials used to build the barriers. In this study, the response of R.C. barriers was detected due to the blast effects caused by two charge weights (50 kg and 400 kg); ANSYS 14 was used to simulate the problem. A horizontal distance of 2 m between the explosive TNT charge and the front face of wall was taken. The pressure on the front face of the concrete barriers was measured at three levels. The R.C. barrier was entirely damaged when subjected to the blast effects caused by 400 kg TNT explosion bomb. However, the 50 kg TNT charge had
... Show MoreAbstract. Froth flotation is a solid-liquid separation technique that uses hydrophobicity as a driving force. Bacteria and other drinking water microorganisms tend to be hydrophobic and can be removed from water using this application. The biggest limitation against using froth flotation in the drinking water industry is the difficulty of producing froth without chemical frothers and holding bacteria in this froth without chemical collectors which deteriorate water taste and odor. Recently, researchers at the University of Sheffield described a method for producing froth using only water and compressed air. This has enabled froth flotation to be studied as an alternative to biocides for the removal of bacteria from drinking water. T
... Show MoreBackground: Nanoparticles are clusters of atoms in a size range from (1-100) nm. Nano dentistry creates amazing useful structures from individual atoms or molecules (nanoparticles), which provides a new alternative and a possibly superior strategy in prevention and treatment of dental caries through management of dental plaque biofilms. The aim of the study was to test the sensitivity of Streptococcus mutans to different concentrations of hydroxyapatite and iron oxide nanoparticles suspension solutions, in comparison to chlorhexidine, and de-ionized water, in vitro. Materials and methods: Agar well technique was applied to test the sensitivity of Streptococcus mutans to different concentrations of hydroxyapatite and iron oxide nanoparticle
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show More That analytical procedures are of analytical tools important because it gives assurance to the auditor-free financial statements of the economic units replace the audit of cases offraud and errors and distortions, and thereby to increase the effectiveness of the audit process and confirm the possibility oftrust and reliance on the financial statements that Adfgaha auditor.
Inspite of identify evidence of proof necessary to enhance the auditor's opinion the results reached in the audit p