This study deals with the absence of state control over the whole of the Syrian geography in creating an environment conducive to the emergence of a new force represented by armed groups and organizations that point to fundamental changes in the conflict and to transform competition for control over the land into a struggle for influence. Which in itself represents the prospects of change in the Syrian scene, and that understanding their interests requires shedding light on the extent of the continuation of this competition and the conflict on land and expansion at the expense of the other, and thus contribute to complicate the Syrian scene, especially after attempts to bite Of land and annexation to each party's areas of influence, especially after the threat of a reluctant organization has subsided. Where it carried with it the strategy of signs of strengthening the influence of Russia in favor of the central state in Syria in the Syrian geography and weighting the balance of power to its advantage
The region-based association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease. Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls. To tackle the problem of the sparse distribution, a two-stage approach was proposed in literature: In the first stage, haplotypes are computationally inferred from genotypes, followed by a haplotype coclassification. In the second stage, the association analysis is performed on the inferred haplotype groups. If a haplotype is unevenly distributed between the case and control samples, this haplotype is labeled
... Show MoreThis research presents a method of using MATLAB in analyzing a nonhomogeneous soil (Gibson-type) by
estimating the displacements and stresses under the strip footing during applied incremental loading
sequences. This paper presents a two-dimensional finite element method. In this method, the soil is divided into a number of triangle elements. A model soil (Gibson-type) with linearly increasing modulus of elasticity with depth is presented. The influences of modulus of elasticity, incremental loading, width of footing, and depth of footing are considered in this paper. The results are compared with authors' conclusions of previous studies.
Many condensed polymers [A1-A7] were prepared via reaction of (Ethylenediaminetetraacetic acid = EDTA), with different prepared imide-diamines by modification [ modification of amino acids and antibiotics (B1- B7)] Imide-diamines were prepared by chlorination of L-amino acids such as [ L-Histidine, L-Alanine, L-Valine, L-Glycine and L-Aspargine ] or selected antibiotics such as [Cephallixine monohydrate and Amoxilline ] with thionyl chloride at 0°C, then reacted with ammonia to obtain imidediamines [B1-B7] . The physical properties of all prepared condensed polymers [A1-A7], new prepared diamines [B1-B7] were studied and characterized by FT -IR spectroscope to certify the structural formulas. The thermal analysis (TGA, DTA) were studied, a
... Show MoreIn this paper the nuclear structure of some of Si-isotopes namely, 28,32,36,40Si have been studied by calculating the static ground state properties of these isotopes such as charge, proton, neutron and mass densities together with their associated rms radii, neutron skin thicknesses, binding energies, and charge form factors. In performing these investigations, the Skyrme-Hartree-Fock method has been used with different parameterizations; SkM*, S1, S3, SkM, and SkX. The effects of these different parameterizations on the above mentioned properties of the selected isotopes have also been studied so as to specify which of these parameterizations achieves the best agreement between calculated and experimental data. It can be ded
... Show MoreThis paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Rec
... Show MoreThe various properties of the ground and excited electronic states of coumarins 102 using density functional theory (DFT) and time-dependent density functional theory (TDDFT) was calculated by the B3LYP density functional model with 6-31G(d,p) basis set by Gaussian 09 W program. Spectral characteristics of coumarin102 have been probed into by methods of experimental UV-visible, and quantum chemistry. The UV spectrum was measured in methanol. The optimized structures, total energies, electronic states (HOMO- LUMO), energy gap, ionization potentials, electron affinities, chemical potential, global hardness, softness, global electrophilictity, and dipole moment were measured. We find good agreement between experimental data of UV spectrum and
... Show MoreA Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More