Terrorist crime is considered a serious act that outweighs all other crimes in terms of impact and result, because it has a wide range on societies, and it also contains a great thing of danger represented in its purpose, and here describing terrorism as a crime is a description that does not give the full right to this behavior or that it It abbreviates it and does not show its actual reality, given that terrorism contains several different crimes and the roles of its contributors, and these roles are necessary to reach the result or the end. In which each episode is complementary to the other, it is not a single act, but rather several joint and complex actions that in turn all lead to the result, and the agreement in the terrorist project begins when agreeing on the formation of the project, and thus the intention and intent is available in its formation and the path to its goal, and therefore, the agreement cannot be considered On the project, it is a consequential contribution as in other crimes, except for the agreement on state security crimes, which the legislator considered an independent crime by mere agreement, even if the crime did not occur and ignored for the people The terrorist threat, therefore, the agreement is an independent act and an existing crime and an original actor who did not commit it even if the crime did not occur, because the danger of the terrorist crime is not less than the seriousness of the state security crimes, but rather it is more dangerous because it is related to society and its change and its connection to belief and thought, so the agreement is in the terrorist project It is a crime for which the law is held accountable, even if it did not occur
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreMotivated by the vital role played by transition metal nitride (TMN) composites in various industrial applications, the current study reports electronic properties, thermodynamic stability phase diagram, and vacancy formation energies of the plausible surfaces of NiAs and WC-type structures of δ3-MoN and δ-WN hexagonal phases, respectively. Low miller indices of various surface terminations of δ3-MoN and δ-WN namely, (100), (110), (111), and (001) have been considered. Initial cleaving of δ3-MoN bulk unit cell offers separate Mo and N terminations signified as δ3-MoN (100): Mo, δ3-MoN(100):N, δ3-MoN(111):Mo, δ3-MoN(111):Mo, and δ3-MoN(001):Mo. However, the (110) plane reveals mix-truncated with both molybdenum and nitrogen atoms i
... Show MoreA new Schiff base of HL has been synthesized from amoxicillin drug and 4- Chlorobenzophenone. Cr (III), Fe (III), Co (II), Ni (II), Cu (II), Cd (II) and Hg (II) mixed ligands complexes of Schiff base and Nicotinamide. Diagnosis of synthesis ligand and its complexes are done by 1HNMR, 13CNMR and thermal analysis for HL ligand, FTIR, UV-visible, molar conductance, CHN analysis, magnetic susceptility and atomic absorption. Octahedral geometries have been suggested for all complexes. All compounds under study were tested antimicrobial activity against four type of bacteria such as Pseudomonas aeruginosa, Escherichia coli, Staphylococcus aureus Bacillis subtilis in nutrient agar.
Drastic threat to the natural system is caused by the uncontrolled release of synthetic pollutants, including azo dyes. This study centered on the decolorization and biodegradation of water soluble azo dye reactive blue (RB) in a batch mode sequential anaerobic-aerobic processes. A local sewage treatment plant was the source where activated sludge was collected to be used as non-adapted mixed culture with both free and the alginate immobilized cells for RB biodegradation. Under anaerobic conditions, the free and immobilized mixed cells were proved to completely decolorize 10 mg/ L of RB within 20 and 30 h, respectively. Alginate- immobilized mixed cells, resulted in 88%, 87%, and 87% maximum COD removals with samples con
... Show MoreExponential distribution is one of most common distributions in studies and scientific researches with wide application in the fields of reliability, engineering and in analyzing survival function therefore the researcher has carried on extended studies in the characteristics of this distribution.
In this research, estimation of survival function for truncated exponential distribution in the maximum likelihood methods and Bayes first and second method, least square method and Jackknife dependent in the first place on the maximum likelihood method, then on Bayes first method then comparing then using simulation, thus to accomplish this task, different size samples have been adopted by the searcher us
... Show MoreThe solution casting method was used to prepare a polyvinylpyrrolidone (PVP)/Multi-walled carbon nanotubes (MWCNTs) nanocomposite with Graphene (Gr). Field Effect Scanning Electron Microscope (FESEM) and Fourier Transformer Infrared (FTIR) were used to characterize the surface morphology and optical properties of samples. FESEM images revealed a uniform distribution of graphene within the PVP-MWCNT nanocomposite. The FTIR spectra confirmed the nanocomposite information is successful with apperaring the presence of primary distinct peaks belonging to vibration groups that describe the prepared samples.. Furthermore, found that the DC electrical conductivity of the prepared nanocomposites increases with increasing MWCNT concentratio
... Show MoreWe investigated at the optical properties, structural makeup, and morphology of thin films of cadmium telluride (CdTe) with a thickness of 150 nm produced by thermal evaporation over glass. The X-ray diffraction study showed that the films had a crystalline composition, a cubic structure, and a preference for grain formation along the (111) crystallographic direction. The outcomes of the inquiry were used to determine these traits. With the use of thin films of CdTe that were doped with Ag at a concentration of 0.5%, the crystallization orientations of pure CdTe (23.58, 39.02, and 46.22) and CdTe:Ag were both determined by X-ray diffraction. orientations (23.72, 39.21, 46.40) For samples that were pure and those that were doped with
... Show More