تهدف هذه الدراسة للتعرف على السياسات اإلاسرائيلية المتبعة على الارض والمتمثلة في االاستيطان
الاستعماري والطرق التفافية، ومصادرة الاراضي وجدار الضم والتوسع العنصري، بالاضافة إلى التصنيف
الاداري للمناطق في الضفة الغربية حسب ما جاء في اتفاقية أوسلو، والتي من شأنها التأثير على تلك
المناطق، وال سيما قطاع اإلسكان الذي يعد من أهم القطاعات التي تتر كب وبالتحديد في منطقة الدراسة،
وسوف تحاول هذه الدراسة تسليط الضوء على أثر هذا الوضع على قطاع الاسكان في محافظة القدس و بلدة
العيزرية من حيث: المساحات المخصصة، واالمتداد والانتشار العمراني للمساكن وتوزيعها الجغرافي،
والخدمات الخاصة بالمساكن، والمشكالت التي توجه هذا القطاع، محاولة وضع تصور مستقبلي لهذا القطاع
في البلدة، معتمدة على المنهج التاريخي والوصفي والتحليلي، مستخدمة عدة أدوات منها: الخرائط والصور
الفوتوغرافية والزيارات الميدانية، وقد خلصت الدراسة إلى عدة نتائج من أهمها: ثبات مساحة المخططات
تقارب العشرون عاماً 44 %من المساحات الفارغة المخصصة للسكن تقع في المناطق الهيكلة لمدة ، كما أن
المصنفة"ج"، و استخدام قطاع اإلسكان في البلدة كأداة لتحقق السياسات الديمغرافية داخل حدود مدينة
القدس، بينما لم ينحصر تأثير السياسات اإلاسرائيلية على قطاع الاسكان من ناحية المساحة وعدد المساكن
بل تعدى ذلك ألى فرض تأثيرات اجتماعية واقتصادية وديمغرافية ، وكذلك تأثيرات من الناحية العمرانية
والتخطيطية، وأوصت الدراسة بضرورة وضع مخططات تتناسب مع الواقع تأخذ بعين االعتبار جميع
المتغيرات للخروج بنماذج تخطيطية خاص بالحالة الفلسطينية، والابتعاد عن المخططات الهيكلية الكلاسيكية
.التي تبتعد في محتوياتها ومضمونها عن الواقع الذي فرض من قبل اسرائيل وسياساتها العنصرية
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreA theoretical model is developed to determine time evolution of temperature at the surface of an opaque target placed in air for cases characterized by the formation of laser supported absorption waves (LSAW) plasmas. The model takes into account the power temporal variation throughout an incident laser pulse, (i.e. pulse shape, or simply: pulse profile).
Three proposed profiles are employed and results are compared with the square pulse approximation of a constant power.
The present art icle discusses the prob lems of understanding and translating the lingu istic and cult ural aspect of a foreign lite rary text. The article considers the trans lation process through the pr ism of cult ural orientation. In the process of transl ation, the nati onal cultural iden tity should be expressed to the max imum extent, through all me ans of expre ssion that include imagery and inton ation. In addi tion to the author's sty le, special atte ntion should al so be pa id to tro pes, phraseological uni ts, colloquial wo rds and dial&n
... Show MoreOne of the main techniques to achieve phase behavior calculations of reservoir fluids is the equation of state. Soave - Redlich - Kwong equation of state can then be used to predict the phase behavior of the petroleum fluids by treating it as a multi-components system of pure and pseudo-components. The use of Soave – Redlich – Kwon equation of state is popular in the calculations of petroleum engineering therefore many researchers used it to perform phase behavior analysis for reservoir fluids (Wang and Orr (2000), Ertekin and Obut (2003), Hasan (2004) and Haghtalab (2011))
This paper presents a new flash model for reservoir fluids in gas – oil se
The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show Moreתקציר
ביטויי אהבה ושנאה קבלה בההגדרות שונות, לפעמים ביניהם לבין עצמם והסכימו בזמנים אחרים מהבחינה הדתית נתפסה לאהוב ביטויים ושנאה במונחים של טוב ורע, או במונחים של חלאל וחראם למעשה, הרגשות של אהבה ושנאה הם רגשות אנושיים המקושרים לאמונות של חברות אנושיות הבנויות על העמדה של דתות מכל נושא או מקרה , דבר אשר אהוב על ידי הקדושים והכמורה יהיה חלאל, וכל מה שהם שונאים יהיה חראם במילים אח
... Show MoreThe focus of this research lies in the definition of an important aspect of financial development, which is reflected on the alleviation of poverty in Iraq, namely financial inclusion and then taking the path of achieving a sustainable economy, certainly after reviewing one of the important international experiences in this regard and finally measuring the level of financial inclusion in Iraq and its impact on poverty reduction through the absolute poverty line indicator.
The aim of the research to apply TD-ABC technology to determine the idle capacity of the central oil companies (oil field east of Baghdad), as a modern cost management technology based on time-oriented activities (TD-ABC) is used by industrial companies in general and oil companies on In particular to build a sustainable Calvinist pillar and make future decisions by identifying idle energy to gain it a competitive advantage, the descriptive analytical approach has been adopted in calculating and analyzing the company’s data for 2018, and the most prominent conclusions of this research are managing idle energy and the task of applying cost technology on the basis of time-oriented activities and providing Convenient spatial infor
... Show More
There is no doubt that the achievement of the manuscripts of There is no doubt various of situations for performing a duty , The diversity of stimuli in humans with sensory, unconscious and instinct sensitive systems. Which leads to a diversity of feelings, sensations, emotions and feelings, This therefore requires different types of function linguistic structures indication , Of that linguistic potential that God willing to be unique, In the function of discharging and venting those feelings and emotions that are raised by its various stimuli, which are only needs and psychological and biological purposes require verification and access and gain it. S
... Show More