Despite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving
... Show MoreBackground: laparoscopic cholecystectomy (LC) is getting popularity for the treating of symptomatic gall bladder disease; conversion from laparoscopic to open cholecystectomy (OC) is also common.
Objective : To find out the prevalence of causes, risk factors of conversion from LC to OC among patient suffering from gall bladder disease, and to explore the most common causes of conversion from laparoscopic to open cholecystectomy.
Methods: This prospective study was conducted in the department of general surgery at Alkindy teaching hospital from first of January 2016 to the end of December 2017 .Nine hundred twenty patient were included. Patient age, gender, his
... Show MoreAn experimental and theoretical analysis was conducted for simulation of open circuit cross flow heat
exchanger dynamics during flow reduction transient in their secondary loops. Finite difference
mathematical model was prepared to cover the heat transfer mechanism between the hot water in the
primary circuit and the cold water in the secondary circuit during transient course. This model takes under
consideration the effect of water heat up in the secondary circuit due to step reduction of its flow on the
physical and thermal properties linked to the parameters that are used for calculation of heat transfer
coefficients on both sides of their tubes. Computer program was prepared for calculation purposes which
cover a
Abstract:
This research aims to the importance of oil in achieving economic
security in the Arab. Oil is not an ordinary subject and returns it significance to
the followings:
1. The importance of skipping a source of energy.
2. The importance of oil as raw material for petrochemical industry.
3. The importance of the oil sector as an area of foreign investment
4. The importance of oil in the marketing activities, transport, insurance
and various services
In addition to the importance of oil in general and the Arab oil has
additional strategic advantages such as geographic location, And the
magnitude of reserves and production of heavy investment costs are relatively
simple, And the ability to meet the
The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThis study sought to give a general picture of the organizations and formations of the ground forces of the Abbasid army in its first era, in preparation and armament and continuous development of the mechanisms to help maintain the moral and spiritual morale in the fighting.
Therefore, the caliphs' interest in building the army, organizing it, arming it, choosing competent leaders, and providing them with various weapons in terms of production and storage, as well as taking care of fortifying the cities and gaps in determination and determination, and embarked on construction and restoration, where amazing speed and acted according to the circumstances. During the first Abbasid era, there were significant developments in the military
Language is the realistic and sensitive basis for any communication between two or more parties. It is an important workshop that prepares meanings and coding them according to a linguistic structure governed by agreed rules that speak to and coexist with everyone.
Whereas the forms of communication are: personal, mediator and mass, none of them can move away from language in their dealings and communication patterns. Since each has its own characteristics and skills, it must be launched in its fields through verbal and non-verbal symbols and wears the elements of influential language as intended.
It makes the recipient face two things: whether he fails to understand those symbols hence its purpose fail, or he meditates s
... Show More