Preferred Language
Articles
/
pxiuz5QBVTCNdQwCFSDJ
The security problem in the Gulf Cooperation Council countries Study on internal challenges and future prospects
...Show More Authors

The importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing international and regional powers to preserve their interests and ensure the achievement of their objectives. This has further complicated the internal security environment in the Gulf, especially the recent events represented by a package of measures taken by Saudi Arabia, the UAE and Bahrain. As well as Egypt against Qatar, have begun to reveal to us the depth and root of differences, the size of internal challenges and the weakness of the ability of the GCC countries to meet their obligations in laying the foundations of a joint security-defense system with the capacity to face these challenges collectively, Security challenges are therefore not only external regional or international, but internal with inter-GCC interface

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 11 2017
Journal Name
Journal: Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Characterization of some Metal Complexes with (3Z ,5Z, 8Z)-2-azido-8-[azido(3Z,5Z)-2-azido-2,6- bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide(L-AZ) .
...Show More Authors

The reaction of LAs-Cl8 : [ (2,2- (1-(3,4-bis(carboxylicdichloromethoxy)-5-oxo-2,5- dihydrofuran-2-yl)ethane – 1,2-diyl)bis(2,2-dichloroacetic acid)]with sodium azide in ethanol with drops of distilled water has been investigated . The new product L-AZ :(3Z ,5Z,8Z)-2- azido-8-[azido(3Z,5Z)-2-azido-2,6-bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H-1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide was isolated and characterized by elemental analysis (C.H.N) , 1H-NMR , Mass spectrum and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the L-AZ withM+n: [ ( VO(II) , Cr(III) ,Mn(II) , Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) and Hg(II)] has been i

... Show More
Publication Date
Mon Oct 28 2019
Journal Name
Iraqi Journal Of Science
Re-Evaluation Solution Methods for Kepler's Equation of an Elliptical Orbit
...Show More Authors

An evaluation was achieved by designing a matlab program to solve Kepler’s equation of an elliptical orbit for methods (Newton-Raphson, Danby, Halley and Mikkola). This involves calculating the Eccentric anomaly (E) from mean anomaly (M=0°-360°) for each step and for different values of eccentricities (e=0.1, 0.3, 0.5, 0.7 and 0.9). The results of E were demonstrated that Newton’s- Raphson Danby’s, Halley’s can be used for e between (0-1). Mikkola’s method can be used for e between (0-0.6).The term  that added to Danby’s method to obtain the solution of Kepler’s equation is not influence too much on the value of E. The most appropriate initial Gauss value was also determined to

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Scientific Research Journal Of Engineering And Computer Science
Cryptography Techniques - A Review
...Show More Authors

l

Publication Date
Sat Oct 27 2018
Journal Name
Journal Of Planner And Development
إعادة فرز وتقسيم الوحدات السكنية وأثرها الاجتماعي والعمراني على المحلة السكنية دراسة تحليلية
...Show More Authors

يتناول البحث انتشار ظاهرة إعادة فرز وتقسيم الوحدات السكنية ذات المساحات الكبيرة الى قطع
صغيرة وبمساحات تصل أحيانا الى اقل من 100 م 2 وعدم التقيد بقوانين البناء ، وقد وجدت اسباب عدة لتفاقم
وانتشار هذه الظاهرة منها ت ردي الحالة الاقتصادية للمواطن والكثافة السكانية المتزايدة والانشطارات العائلية
وارتفاع بدلات الإيجار وعدم توفر السكن ، وهناك من استغل هذا الامر نتيجة لضعف الرقابة من قبل
الجهات المتخصصة في

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Boubaker Scaling Operational Matrices for Solving Calculus of Variation Problems
...Show More Authors

     In this paper, a general expression formula for the Boubaker scaling (BS) operational matrix of the derivative is constructed. Then it is used to study a new parameterization direct technique for treating calculus of the variation problems approximately. The calculus of variation problems describe several important phenomena in mathematical science. The first step in our suggested method is to express the unknown variables in terms of Boubaker scaling basis functions with unknown coefficients. Secondly, the operational matrix of the derivative together with some important properties of the BS are utilized to achieve a non-linear programming problem in terms of the unknown coefficients. Finally, the unknown parameters are obtaine

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Linear Feedback Shift Registers-Based Randomization for Image Steganography
...Show More Authors

     Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Selecting Optimum Dimensions for a Three-Phase Horizontal Smart Separator for Khor Mor Gas-Condensate Processing Plant
...Show More Authors

      The Khor Mor gas-condensate processing plant in Iraq is currently facing operational challenges due to foaming issues in the sweetening tower caused by high-soluble hydrocarbon liquids entering the tower. The root cause of the problem could be liquid carry-over as the separation vessels within the plant fail to remove liquid droplets from the gas phase. This study employs Aspen HYSYS v.11 software to investigate the performance of the industrial three-phase horizontal separator, Bravo #2, located upstream of the Khor Mor sweetening tower, under both current and future operational conditions. The simulation results, regarding the size distribution of liquid droplets in the gas product and the efficiency gas/liquid separation, r

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Abu Dhabi International Petroleum Exhibition & Conference
Numerical Simulation of Gas Lift Optimization Using Artificial Intelligence for a Middle Eastern Oil Field
...Show More Authors
Abstract<p>Artificial lift techniques are a highly effective solution to aid the deterioration of the production especially for mature oil fields, gas lift is one of the oldest and most applied artificial lift methods especially for large oil fields, the gas that is required for injection is quite scarce and expensive resource, optimally allocating the injection rate in each well is a high importance task and not easily applicable. Conventional methods faced some major problems in solving this problem in a network with large number of wells, multi-constrains, multi-objectives, and limited amount of gas. This paper focuses on utilizing the Genetic Algorithm (GA) as a gas lift optimization algorit</p> ... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing digital documents using digital watermarking
...Show More Authors

     The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents.  But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..

In this research LSB  technique  has been used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
Improving Extractive Multi-Document Text Summarization Through Multi-Objective Optimization
...Show More Authors

Multi-document summarization is an optimization problem demanding optimization of more than one objective function simultaneously. The proposed work regards balancing of the two significant objectives: content coverage and diversity when generating summaries from a collection of text documents.

     Any automatic text summarization system has the challenge of producing high quality summary. Despite the existing efforts on designing and evaluating the performance of many text summarization techniques, their formulations lack the introduction of any model that can give an explicit representation of – coverage and diversity – the two contradictory semantics of any summary. In this work, the design of

... Show More
View Publication Preview PDF