The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.
Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea
... Show MoreNano-crystalline iron oxide nanoparticles (magnetite) was synthesized by open vessel ageing process. The iron chloride solution was prepared by mixing deionized water and iron chloride tetrahydrate. The product was characterized by X-Ray, Surface area and pore volume by Brunauer-Emmet-Teller, Atomic Force Microscope (AFM) and Fourier Transform Infrared Spectroscopy(FTIR) . The results showed that the XRD in compatibility of the prepared iron oxide (magnetite) with the general structure of standard iron oxide, and in Fourier Transform Infrared Spectroscopy, it is strong crests in 586 bands, because of the expansion vibration manner related to the metal oxygen absorption band (Fe–O bonds in the crystals of iron ox
... Show Moreprotein oxidation through oxidative stress, which represents the overall status of the protein in the cell/tissue. Due to their increased levels of AOPPs were reported during T2DM. The aim of this study was to assess AOPP level in T2DM subjects with foot ulcer (DFU) and explore its correlation with infection. Type 2 diabetic patients (n=108) and healthy subjects (n=25) were enrolled in this study. The T2DM group was subdivided to diabetic patients without complications (n=25) and eighty-three (83) of them have diabetic foot. They were sub- grouped into two groups according to presence Osteomyelitis and abscess, and in reliance on medical analysis of WBC count and CRP. Group of diabetic without superficial or deep ulcer and no osteomyelitis
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThe debate on the methodology of media and communication research is no longer subject to the logic of the contradiction between the quantitative and the qualitative approach, nor the logic of the comparison between them. The nature of the topics presented for research, the problems they raise, the goals to be achieved from the research, and the epistemological positioning of researchers are among the critical factors that dictate the appropriate approach or methodological approaches to conduct their research. This positioning means the implicit philosophical principles upon which any researcher relies and which determine the path he/ she takes to produce scientifically approved knowledge. The method of the researcher's access to the phe
... Show MoreThe impact of Jurisprudence Rules in Addressing Contemporary security Challenges
Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and pre
... Show MoreEfficient and cost-effective drilling of directional wells necessitates the implementation of best drilling practices and advanced techniques to optimize drilling operations. Failure to adequately consider drilling risks can result in inefficient drilling operations and non-productive time (NPT). Although advanced drilling techniques may be expensive, they offer promising technical solutions for mitigating drilling risks. This paper aims to demonstrate the effectiveness of advanced drilling techniques in mitigating risks and improving drilling operations when compared to conventional drilling techniques. Specifically, the advanced drilling techniques employed in Buzurgan Oil Field, including vertical drilling with mud motor, managed pres
... Show MoreMassive multiple-input multiple-output (MaMi) systems have attracted much research attention during the last few years. This is because MaMi systems are able to achieve a remarkable improvement in data rate and thus meet the immensely ongoing traffic demands required by the future wireless networks. To date, the downlink training sequence (DTS) for the frequency division duplex (FDD) MaMi communications systems have been designed based on the idealistic assumption of white noise environments. However, it is essential and more practical to consider the colored noise environments when designing an efficient DTS for channel estimation. To this end, this paper proposes a new DTS design by exploring the joint use of spatial channel and n
... Show MoreThe study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show More