Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strategic importance to European countries that are characterized by the poverty of their resources in traditional energy and depend On the imports of other countries, and accordingly, these countries are trying to search for alternative sources. Germany was one of the first countries that paid attention to the energy transition in terms of its interest in building projects for energy stations with a production capacity of more than 20 megawatts.
Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreA new four series of 2,2′-([1,1′- phenyl or biphenyl]-4,4′-diylbis(azanediyl)) bis(N′-((E)-1-(4-alkoxyphenyl) ethylidene) acetohydrazide) [V-XI]a,b and 1,1′-(2,2′-([1,1′- phenyl or biphenyl]-4,4′-diyl bis(azanediyl)) bis- (acetyl)) bis(3-(4-ethoxyphenyl)-1H-pyrazole-4-carbalde hyde) [XII-XVIII]a,b have been synthesized by varying terminal lateral alkoxy chain length (n = 1–3, 5–8), central linkage group (phenyl or biphenyl) and induced pyrazole heterocyclic ring in the main chain. The last two series were synthesized by the cyclization of substituted acetophenone hydrazones with Vilsmeier–Haack reagent (DMF/POCl3) to produce 4-formylpyrazole derivatives. The chemical structures of the synthesized compounds were examine
... Show MoreThe adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.
Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive convers
... Show MoreThe aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive
... Show More6-(2-benzathiazolyl azo),-3,5-dimethylphenol was formed by grouping the 2- benzothiazole diazonium chloride with 3,5-dimethylphenol. Azo ligand(L) was resolved on the origin by 1H and 13CNMR, FTIR and UV-V is spectral analysis. Complexation of tridentate ligand (L) with Co2+, Ni2+, Cu2+ and Zn2+ in aqueous of ethyl alcohol with a 1:2 metal:ligand, and at ideal pH.. The formation of metal chelates are assigned using flame atomic, absorption, FTIR, and UV-Vis spectral analysis, other than conductivity and magnetic estates. The nature of the metal chelates were carried out by mole ratio and continuous, variation mechanism, Beer's law, followed the rate (0.0001 - 3×0.0001 M) concentration., High molar, absorptivity, for the complex solutions w
... Show More