The study of the subject of (Egyptian public opinion on the Libyan revolution) came to reveal the role of Egyptian public opinion in mobilizing and solidarity for the masses. With the events witnessed by the Arab countries before the revolution, this was evident by the people 's attitudes towards the tripartite aggression against Egypt in 1956, and the June 1967 war, and the most recent what the Egyptian people showed towards the Libyan revolution. The Egyptian press followed the completion of the arms deal with France and revealed the ability of the Libyan negotiator to achieve moral gain, supported by Egyptian support to thwart the United States intentions to arm "Israel" similarly. The Egyptian people expressed a love for peace and support for the government's decision to embrace King Senussi, keeping in mind the interest of the Libyan people in achieving their goals in peace and security without resorting to methods of force.
Recently, some prostate cancer patients have acquired resistance to the second -generation drugs (anzalutamide and apalutamide) prescribed for the treatment of this disease due to the emergence of the F876L mutation, which represents a challenge to modern medicine. In this study, a new series of 2-thiohydantoin derivatives were prepared through the reaction of different derivatives of maleimide (1c-4c) with isothiocyanate derivatives. The prepared compounds were diagnosed using FT-IR,1H-NMR ,13C-NMR, Mass spectra. The prepared series compounds has been studied against prostate cancer cells. The MTT assay was used to determine the activity of the prepared compounds against prostate cancer cells. The da
... Show MoreThe current research aims to :
•know the level of the chaotic behavior of the sample as a whole .
•Know the differences with statistical significance in disorderly behavior between the
disadvantaged and non-disadvantaged peers .
To achieve these objectives, the selected sample of Talbhalmrahlh medium and specifically
students of the second grade average, were chosen randomly stratified's (360) students
included sex (male, female) and (deprived of the Father and the non-deprived) for the
academic year (2013-2014) to the province Baghdad on both sides (Rusafa-Karkh (
As applied to them measurements of disorderly behavior, which is prepared by the researcher,
having achieved _khasaúsma of psychometric (valid
This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
The importance of the research lies in preparing exercises using a proposed device to learn the skill of thehuman wheel on a machine rug of ground movements of the artistic gymnastics. As for the research problem:Through the presence of the two researchers as teachers and observers of this sport in the gymnastics hall,they noticed that there is difficulty in the students’ performance of the skill of the round off on the machineof the mat of ground movements, according to the researchers’ opinion, the reason for this is that skillsare taught with the limited availability of assistive devices, as well as the lack of use of these devices inexercises according to biomechanical variables, although they facilitate the learning process
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show Morehe current research aims to determine the extent of interest of the Oil Products Distribution Company (OPDC) and its various departments in the process of strategic foresight (SF), and the extent of interest that is reflected in the achievement of strategic leadership (SE). As well as knowing the nature of the relationship and the impact on the company. To achieve the objectives of the research, one main hypothesis was formulated, and three sub-hypotheses emerged from it. As the research relied on an analytical survey approach, the research targeted the workers within this company, And he reached a set of results, based on which a number of conclusions were formulated. The research community consisted of (185) individuals, and (160)
... Show MoreThe present study included the physico-chemical parameters of Lesser-Zab river and its effects on Tigris river. Monthly water samples were taken from the two rivers during January to October 1999.There were no signifcant difference in water temperatures. Both rivers were fresh to oligohalin, alkaline and very hard. Close values were determined in total suspended solids in both rivers with little increasing during rainfall period and high discharge. Water was well areated and over saturation was recorded in several occasions. Dissolved oxygen values of Tigris river were influenced by Lesser-Zab. Cations were more dominant than anions in both rivers. In Lesser-Zab, the anions were increased during spring season and declined in summer which t
... Show More