شكلت التطورات التكنولوجية في وسائل التواصل الاجتماعي الناجمة عن العولمة معلم رئيسي في تحولات التنظيمات الإرهابية، وإنتاج انماط جديدة من الإرهابيين والمتطرفين القادرين على التفاعل مع الثورة المعلوماتية والاتصالية. ان معظم الجرائم الإرهابية الإلكترونية مرتبطة بالإنترنت وهو المسرح المفضل للمتطرفين فالأول يقتل والثاني يسوغ ويحرض ويجند، والذي جعل الإنترنت وسيلة فعالة كونها سهلة الاستخدام وسريعة الوصول إلى الجمهور ورخيصة الثمن وساحة حرة بلا رقيب على ما يكتب ويشاهد. وعلى الرغم من أن الإرهاب الإلكتروني يعد واحداً من التهديدات الكبيرة لأمن المجتمع الدولي إلا ان التشريعات القانونية الدولية لمواجهته تعتمد على الإطار القانوني لمواجهة الإرهاب والجرائم التكنولوجية عموماً. ولا يوجد موقف دولي واضح ولا ضوابط او سوابق قانونية يمكن الاستناد إليها، أو حتى أتفاقية دولية واضحة شاملة حول الأمن الإلكتروني لتجريم المتطرفين والإرهابيين مستخدمي وسائل التواصل الأجتماعي .
Background: Colorectal Adenocarcinoma contributes one of the most common malignancies and the second leading cause of death from cancer in the western world. Epidermal growth factor receptor (EGFR) belongs to a family (ErbB-tyrosine receptors), EGFR plays an important role in the pathogenesis of colorectal cancer.
Objectives: to evaluate the immunohistochemical expression of epidermal growth factor receptors (EGFR) in colorectal adenocarcinoma and to correlate this expression with different clinicopathological parameters.
Pateints and method: In this study clinicopathological parameters of twenty five colorectal adenocarcinoma cases diagnosed in private pathology laboratories in Baghdad /Iraq from November 2012 to September 2013 we
In recent years, the attention of researchers has increased of semi-parametric regression models, because it is possible to integrate the parametric and non-parametric regression models in one and then form a regression model has the potential to deal with the cruse of dimensionality in non-parametric models that occurs through the increasing of explanatory variables. Involved in the analysis and then decreasing the accuracy of the estimation. As well as the privilege of this type of model with flexibility in the application field compared to the parametric models which comply with certain conditions such as knowledge of the distribution of errors or the parametric models may
... Show MoreIn Indonesia, cattle feces (CF) and water hyacinth (WH) plants are abundant but have not been widely revealed. The use of microorganisms as decomposers in the fermentation process has not been widely applied, so researchers are interested in studying further. This study was to evaluate the effect of the combination of CF with WH on composting by applying white-rot fungal (WRF) (Ganoderma sp) microorganism as a decomposer. A number of six types of treatment compared to R1(ratio of CF:WH)(25%:75%)+WRF; R2(ratio of CF:WH)(50%:50%)+WRF; R3(ratio of CF:WH)(75%:25%)+WRF; R4(ratio of CF:WH)(25%:75%) without WRF; R5(ratio of CF:WH)(50%:50%) without WRF; R6(ratio of CF:WH)
... Show MoreIn order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.
Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreAbstract
This work involves the manufacturing of MAX phase materials include V2AlC and Cr2AlC using powder metallurgy as a new class of materials which characterized by regular crystals in lattice. Corrosion behavior of these materials was investigated by Potentiostat to estimate corrosion resistance and compared with the most resistant material represented by SS 316L. The experiments were carried out in 0.01N of NaOH solution at four temperatures in the range of 30–60oC. Polarization resistance values which calculated by Stern-Geary equation indicated that the MAX phase materials more resistant than SS 316L. Also cyclic polarization tests confirme
... Show MoreThis research includes the application of non-parametric methods in estimating the conditional survival function represented in a method (Turnbull) and (Generalization Turnbull's) using data for Interval censored of breast cancer and two types of treatment, Chemotherapy and radiation therapy and age is continuous variable, The algorithm of estimators was applied through using (MATLAB) and then the use average Mean Square Error (MSE) as amusement to the estimates and the results showed (generalization of Turnbull's) In estimating the conditional survival function and for both treatments ,The estimated survival of the patients does not show very large differences
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreMosquitoes like Culex quinquefasciatus are the primary vector that transmits many causes of diseases such as filariasis, Japanese encephalitis, and West Nile virus, in many countries around the world. The development in the scientific fields, such as nanotechnology, leads to use this technique in control programs of insects including mosquitoes through the use of green synthesis of nanoemulsions based on plant products such as castor oil. Castor oil nanoemulsion was formulated in various ratios comprising of castor oil, ethanol, tween 80, and deionized water by ultrasonication. Thermodynamic assay improved that the formula of (10 ml) of castor oil, ethanol (5ml), tween 80 (14 ml) and deionized water (71ml) was mor
... Show More Background: pedicular screw fixation is rapidly becoming a widely used method of spinal instrumentation. Despite improvement in design of instruments and surgical technique and the use of intra-operative fluoroscopy, pedicle cortical perforations occur endangering nearby neurovascular or extra vertebral structures.
Objective: This is a prospective (consecutive cases study) designed for Evaluation of incidence of pedicle screw misplacement in our study sample, compare our results to what is published in literature.
Patients and Method: This study involved 25 adult patients ( 10 males and 15 females ) their age ranged between ( 18 and 70 years) who underwent spinal surgery with pedicle screw fixation for different disorders of