Preferred Language
Articles
/
jcoeduw-1648
The Counselor Brent Scowcroft and his Role in Achieving the Requirements of the American National Security
...Show More Authors

       Despite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving security. Researing about Brent Scowcroft’s role in meeting the requiremnets of the united States’ national security, it has been found necessary to include two pivots to the study. The first pivot disscusses the requirements of achieving the national security of the United States of America, whereas the second pivot tackles Brent Scowcroft’s role, through the mechanisms of the national security council, in achieving the national security requirements in particular within the decision-making process in the history of the contemporary American political system. As for the type of the study, it is a historical study within the axis of contemporary American politics, while the methodology of the study came within the scientific analysis and according to the narrative and descriptive historical approach. This is because the research problem emphasizes the identification of the security and military requirements in order to achieve the integration of the national security of the United States. Finally, the conclusions have verified the National Security Adviser’s prominent role of during the Scowcroft era, in conductng partnership with the Ministry of Foreign Affairs in the decision-making process. The latter has said to affect the overall foreign policy and achieve the national security requirements of the United States of America at the end of the last century.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 10 2024
Journal Name
Journal Of Mathematics And Computer Science
The role of human shield in prey‎, ‎crop-raiders and top predator species in southwestern Ethiopia's coffee forests‎: ‎a modeling study
...Show More Authors

In this work, we have developed a model that describes the relationships between top predators (such as tigers, hyenas, and others), crop raiders (such as baboons, warthogs, and deer), and prey (such as deer) in the coffee forests of southwest Ethiopia. Various potential equilibrium points are identified. Additionally, the model's stability in the vicinity of these equilibrium points is examined. An investigation of the model's Hopf bifurcation is conducted concerning several significant parameters. It is found that prey species may be extinct due to a lower growth rate and consumption by top predators in the absence of human interference in the carrying capacity of prey. It is observed that top predators may be extinct due to human interfe

... Show More
View Publication
Scopus (20)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri May 22 2026
Journal Name
Magazine Aldhakwat Albedh
The impact of atheism on the individual and society, Iraq as a model
...Show More Authors

Atheists have spread in the modern era, so that atheism has become a bad phenomenon in the world in general and in Islamic societies in particular, so the research aims to study the individual and social effects left by atheism on the atheists themselves, and the research included multiple axes: atheism linguistically and idiomatically, atheism in the Qur’an Noble and Modern (and Contemporary) Atheism Statistics: and the reasons for atheism: Studying the phenomenon of atheism in Iraq as a model, then studying the effects of atheism: on the individual first, then atheism and its impact on society, then the conclusion, recommendations, sources and references

View Publication Preview PDF
Publication Date
Wed Nov 06 2024
Journal Name
2024 17th International Conference On Development In Esystem Engineering (dese)
Reducing Bandwidth and Storage Requirements for Surveillance Videos Using ROI Extraction and Compression
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Wed Jun 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
The Picture of the romantic hero in: A Bridge Towards the Basific and The Lover
...Show More Authors

This research deals with number of novels for Marguerit Doras , specially A Bridge Towards Basfic and The Lover . we specialize the first chapter for discussing a very important issue , which is the Maraguerit Doras novelist world in another word the most important themes . that we discuss and through that we tried to clerify the privacy the characters of Marguerit Doras in comparative with her own generation and in the second chapter we discussed the most important characteristics of the romantic hero spedially the characteristics of women in her novels.

View Publication Preview PDF
Publication Date
Fri Jun 20 2025
Journal Name
Baghdad Science Journal
The Role of Fear and Predator Dependent Refuge on a Stage Structure Prey-Predator System
...Show More Authors

The present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jan 05 2009
Journal Name
J. Duhok Univ
The role of red pigment produced by Serratia marcescens as antibacterial and plasmid curing agent
...Show More Authors

Preview PDF
Publication Date
Fri Mar 29 2024
Journal Name
Surgical Neurology International
Enhancing neuro-ophthalmic surgical education: The role of neuroanatomy and 3D digital technologies – An overview
...Show More Authors
Background:

Neuro-ophthalmology, bridging neurology and ophthalmology, highlights the nervous system’s crucial role in vision, encompassing afferent and efferent pathways. The evolution of this field has emphasized the importance of neuroanatomy for precise surgical interventions, presenting educational challenges in blending complex anatomical knowledge with surgical skills. This review examines the interplay between neuroanatomy and surgical practices in neuro-ophthalmology, aiming to identify educational gaps and suggest improvements.

Methods:

A literature search across databases such as PubMed, Scopus, and W

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
The I and the Other (Lenora) in the Poetry of Joseph III
...Show More Authors

A literary text is not void of the use of the ego and the other while speaking or in a spoken communication. Such a usage is apparently outstanding in Arabic literature, and it reflects society in all its various cultural, social and political conditions. Therefore, the ego is one of the prominent concepts on which human personality is built, and its role in the formation of society and in communicating among all human societies. Accordingly, the present paper aims to clarify the duality of the ego and the other, where the ego starts from the poet himself to expand the circle of subjectivity by including his family, society, immediate surroundings, race and his religion. The other, on the other hand, that is separated from the poet,

... Show More
View Publication Preview PDF
Crossref