In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle East in favor of their organization. They tried to co-opt the jihad volunteers who traveled to Bosnia after the break-up of Yugoslavia in 1992 after the Bosnian army was able to contain them but ended up expelling them in the fall of 1995. A year later, al-Qaeda achieved greater success in supervising the training of Pakistani fighters who were smuggled into Kashmir to play a combat role In Afghanistan and elsewhere. Al-Qaeda members have also succeeded in excluding local supporters of Kashmir's independence and mixing the cards between national independence,
نحو الجملة البسيطة المعقدة
This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show Moreيعكس التراث هوية الأفراد والمجتمعات ليس فقط لكونه امتداد الماضي إلى الحاضر بل لأنه يمثل مردودا اقتصاديا واجتماعيا وسياسيا فاعلا في المجتمعات الحاضرة وهو ما أدى إلى اهتمام دولي ووطني كبير بضرورة حمايته لذلك في هذه الأطروحة يتناول الباحث موضوع التنظيم القانوني الدولي للمناطق المسجلة ضمن لائحة التراث العالمي دراسة حالة العراق وفي إطار تعميق الفهم بالتراث العالمي تناولت الباحثة التعريف بالتراث العالمي الذي ي
... Show Moreشكلت التطورات التكنولوجية في وسائل التواصل الاجتماعي الناجمة عن العولمة معلم رئيسي في تحولات التنظيمات الإرهابية، وإنتاج انماط جديدة من الإرهابيين والمتطرفين القادرين على التفاعل مع الثورة المعلوماتية والاتصالية. ان معظم الجرائم الإرهابية الإلكترونية مرتبطة بالإنترنت وهو المسرح المفضل للمتطرفين فالأول يقتل والثاني يسوغ ويحرض ويجند، والذي جعل الإنترنت وسيلة فعالة كونها سهلة الاستخدام وسريعة الوصول إلى
... Show Moreالحركات الاسلامية في ظل الوضع الدولي الجديد
كان لسياسات االحتالل دور بارز في فشل مشروع إعادة بناء الدولة في افغانستان، وفي الوقت نفسه تتحمل دول االحتالل المسؤ و لية الكاملة عن بعض هذه ً كبي ارً السياسات مثل عدم التخطيط الجيد لمرحلة االحتالل وإعادة بناء الدول ة، ثم إن جزءا من فشل هذه السياسات يرجع الى البيئتين المحلية واإلقليمية ، كذلك كان للخبرة السياسية والدستورية وللواقع االجتماعي الثقافي األفغاني تأثيرهما المهم في قدرة المجتمع األفغاني ً على قبول
... Show MoreThis paper deals with constructing mixed probability distribution from mixing exponential
A study of the Torymid collection of Iraq. resulted in undescribed species of the genus
Liodontonierus Gah. L. longicorpus sp. n. with 2 figures.
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the