كان لنهاية الحرب الباردة وعولمة العالم على وفق رؤية كونية تتجاوز حدود ومفاهيم السيادة الوطنية والقومية الاثر الواضح في ترتيب العلاقات الدولية , واصبحت تلك العلاقات تدور حول محورين الاول .. هو الاعتماد المتبادل بين الدول من اجل الوصول الى خطوط مشتركة للمصالح المختلفة بين هذه الدول . والآخر.. هو تبعية الدول الضعيفة للدول القوية لافتقار الاولى توفير الحاجيات الى مواطنيها . هذا يشير الى نشأة علاقات جديدة بين دول تتمركز حول الذات الى حد كبير ولكنها ليست منغلقة على نفسها ولكنها تدخل في اطار صراعات دولية جديدة , مما يشير لنوع جديد من التفاعلات , ومصدر تلك التفاعلات تكمن في المقوم التكنلوجي واثره على السياسة الخارجة للدولة وبصورة تمكن الدول المتنفذة عالميا " وخاصة الولايات المتحدة الامريكية لتكريس هيمنها العالمية عبر آليات التطور التي اعترت هذا المقوم.
The research problem can be summarized through focusing on the environment that surrounds students and class congestion, how these factors affect directly or indirectly the academic achievement of students, how these factors affect understanding the scientific material that the student receives in this physical environment, how classroom’s components such as seats, space With which the student can move, the number of students in the same class, the lighting, whether natural or artificial, and is this lighting sufficient or not enough, the nature of the wall paint old or modern, is it comfortable for sight, the blackboard if it is Good or exhausted, In addition to air-conditioning sets in summer and winter, this is on the on
... Show MoreIn this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is
... Show MoreThis study aimed to determine the possibility of culturing genus Artemia in under laboratory conditions for locally culturing and producing. Different salinity concentrations were used, ranging from 5-40g/l . the results showed that the concentration 30g/l is the best for hatching. This concentration recorded hatching efficiency of 68800 nauplii/g cysts and hatching percentage of 45.86%, while the concentration 5g/l recorded less hatching efficiency and hatching percentage of 20266 nauplii/g and 13.5% respectively . Investigating the effect of salinity on individuals survival and growth using saline concentrations ranging from 30to 100g/l, revealed that the best percentage was 75.00% in the first week with 70g/l, whilst the best rates of
... Show MoreThe activation of inflammatory cells, the release of their mediators, and the excessive production of free radicals may affect circulating lipids, but no evidence supports a role for peroxidation in the pathogenesis of Brucellosis disease. The aim of this work is to study the effect of Brucellosis on lipid profile concentration and oxidant-antioxidant status. We studied 20 Brucellosis patients (18 Females and 2 males) and 15 healthy controls (age average from 16 to 60 years old). Significant differences were noted between the serum lipids of Brucellosis patients and control group. Mean total cholesterol and low density lipoprotein cholesterol (LDL-cholesterol) concentrations were higher in patients than in control group (mean ± SE 197
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More