Notwithstanding the importance of international cooperation as the other facet of international interactions, a strategy of conflict resolution, a maintainer of international peace and security, its provision in the United Nations conventions, as an objective of the United Nations after the international peace and security, however, the recognition of international cooperation has not been underlined by global, intellectual think tanks. While realism emphasized on the state's role in achieving international cooperation to ensure mutual and multilateral interests, liberalism focused on the role of international organizations in building such cooperation. Additionally, constructivist approaches developed other sub-variables to contribute to the success of the state's attempts at international cooperation strategies, such as identity and social construction of the state.As long as there are conflicting interests, various strengths, different capacities, innovative roles in the world order, nations will keep seeking different patterns of bilateral and multilateral cooperation. Additionally, many countries maintain cooperation with various international representatives to ensure that their interests are realized. Thus, different patterns of cooperation divide nations into cooperative nations, those which maintain contact with international organizations and powers, and non-cooperative nations.There are many non-cooperative countries, particularly those that maintain no contact with the United Nations on several issues. Such non-cooperative countries often cite the rejection of unilateral hegemony over the world order, they are in relevant alliances, or the very nature of these countries' roles in conflicts that underpin them regionally or internationally, as in the case of North Korea. Given these varying patterns of cooperation and alliance, the United Nations, the Security Council, the International Atomic Energy Agency (as an authority in North Korea's nuclear crisis, which poses a direct threat to international peace and security), and the other international actors are obliged to take different techniques of negotiation that vary with respect to phases, talks, and tactics.It is worth mentioning that North Korean nuclear program is a threat to international balances on which East Asia's security, regional stability, and the world order rely. Owing to these considerations, this paper examines international cooperation, draws on theoretical backgrounds to define negotiating strategies, and elaborates on the international tactics taken by the International Atomic Energy Agency, the Security Council, the United States of America, Russia, and China to help resolve North Korea's nuclear program.
This study aimed at identifying the trend to applying the Joint Audit as an approach to improve the financial reports quality with all their characteristics (Relevance, Reliability, Comparability, Consistency), as well as enclose the difficulties that faced the auditors in the Gaza Strip in implementing the Joint Audit. In order to achieve the study aims, a measure was used to identify the trend to apply the Joint Audit and it was distributed to the study sample which is consisting of (119) individuals and retrieved thereof (99) valid for analysis, approximately (83.2%), (69) of them are Auditors, (30) financial managers and accountants. The researcher used the analytical descriptive method, and after analyzing the results, the s
... Show More: تفرض مرحلة إعادة بناء الدولة أو مرحلة بناء الدولة حالتين متقاربتين، لكن تختلف تجربة كل منهما عن األخرى، ففي الحالة األولى نعني بها أن دولة ما متكاملة المقومات سواء القانونية أو السياسية أو االقتصادية، وتمتلك هذه الدولة الشرعية القانونية واالعتراف الدولي، لكن تتعرض هذه الدولة لألزمة سواء كانت ثورة أو انقالب أو احتالل، وإلى السقوط ونهاية نظامها السياسي القانوني ومن ثم إعادة بناء الدولة ومنظومتها السياسية..
... Show MoreThe question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.
In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes
... Show MoreThe necessary optimality conditions with Lagrange multipliers are studied and derived for a new class that includes the system of Caputo–Katugampola fractional derivatives to the optimal control problems with considering the end time free. The formula for the integral by parts has been proven for the left Caputo–Katugampola fractional derivative that contributes to the finding and deriving the necessary optimality conditions. Also, three special cases are obtained, including the study of the necessary optimality conditions when both the final time and the final state are fixed. According to convexity assumptions prove that necessary optimality conditions are sufficient optimality conditions.
... Show MoreThe main objective of this paper is to develop and validate flow injection method, a precise, accurate, simple, economic, low cost and specific turbidimetric method for the quantitative determination of mebeverine hydrochloride (MbH) in pharmaceutical preparations. A homemade NAG Dual & Solo (0-180º) analyser which contains two identical detections units (cell 1 and 2) was applied for turbidity measurements. The developed method was optimized for different chemical and physical parameters such as perception reagent concentrations, aqueous salts solutions, flow rate, the intensity of the sources light, sample volume, mixing coil and purge time. The correlation coefficients (r) of the developed method were 0.9980 and 0.9986 for cell
... Show MoreThe research aims to find a contemporary model in analyzing the reasons behind the delay of the investment plan projects suffered by the North Oil Company. This model is able to understand the environment surrounding the implementation of projects in the light of the changes facing the company at the present time, which in turn requires the need to identify the most important strengths and weaknesses Internal and external opportunities and threats using the SWOT matrix and identify the appropriate strategic alternative based on clear policy, strategies and programs to address weaknesses and look to the future prospects as the company can be stronger and more flexible environmental changes surrounding the reality of implementation
... Show MoreThe analytic solution for the unsteady flow of generalized Oldroyd- B fluid on oscillating rectangular duct is studied. In the absence of the frequency of oscillations, we obtain the problem for the flow of generalized Oldroyd- B fluid in a duct of rectangular cross- section moving parallel to its length. The problem is solved by applying the double finite Fourier sine and discrete Laplace transforms. The solutions for the generalized Maxwell fluids and the ordinary Maxwell fluid appear as limiting cases of the solutions obtained here. Finally, the effect of material parameters on the velocity profile spotlighted by means of the graphical illustrations
Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica
... Show More