Abstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under equipped blue helmets have struggled to carry out ambitious mandates while facing severe challenges in the Central African Republic, Mali, South Sudan and elsewhere, only thinly papered over by the international responses to date.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreIn the years recently city planning projects have been confirmed sustainable high concentration on planning streets and pedestrian paths being the most prominent component of the urban structure in the city and these me and diverse departments link the city’s sectors and serve as a space for economic, service, and social activities. On the other hand, pedestrian traffic is an essential component of the various means of transportation within the city. Suffer cities in the Middle East and Arab cities in particular are neglecting pedestrian paths in the vital urban environment. Vehicle control mechanisms on roads, and changing the uses of pedestrian paths as result of encroaching on the sidewalks designated for pedestrians. Which leads to a
... Show MoreThis study focuses on how tax administrations in Iraq use Artificial Intelligence (AI) techniques to monitor tax evasion for individuals and companies to achieve Tax Compliance (TC). AI was measured through four dimensions: Advanced Data Analytics Techniques (ADAT), Explainable AI (EAI), Machine learning (ML), and Robotic Process Automation (RPA). At the same time, TC was measured through registration, accounting, and tax payment stages. We relied on the questionnaire form to measure the variables. A sample of employees in the General Tax Authority in Iraq was selected, and a questionnaire was distributed to 132 people. The results indicated that the dimensions of AI affect achieving TC at all stages. This study provides evidence of using A
... Show MoreThe correlation between dyslipidemia and the severity of coronavirus disease 2019 has been widely categorized. Dyslipidemia is one of the most dominant disorders among these patients. Systemic inflammation accompanied by cytokine storm hemostasis modifications and severe vasculitis have all been reported to occur among COVID-19 patients, and these may contribute to some severe complications.
The aim of this study is to assess the possible relationship between dyslipidemia and the severity of coronavirus disease 2019.
This work encompassed 200
Objective: To investigate and prove that aspirin
protects, or at least attenuates amikacin ototoxicity in
humans.
Method: This study was conducted in 60 patients that
completed all
requirements .The patients were divided into two
groups:
• Control group: receive placebo treatment.
• Drug–treated group: They receive aspirin
coated tablets (1.5gm/ day), 500mg 8 hourly.
Both groups had similar aspects regarding the gender,
age and weight. The duration of therapy was 7 days
and dosage of amikacin was 1gm/day (500mg 12
hourly).
Results: Comparison of Audiometry test in
Ear/Nose/Throat (E.N.T.) Department (Pure Tone
Audiometry) at 1000 Hertz (Hz), 2000 Hz, 4000 Hz,
and 8000 Hz showed sig
The business environment is witnessing great and rapid developments due to the economic and technological development that has caused damage to human beings, which requires the need to reduce this damage and work to protect the environment and participate in supporting the social aspects. This requires economic resources to be realized by the economic units. Economic development in preserving the environment that has caused damage and supporting the social aspects that preserve human rights, enhance their position and satisfy their needs in society. Global professional organizations, the United Nations and stakeholder representatives have been issuing the Global Reporting Initiative (GRI) to find guidelines for the preparation of
... Show MoreBackground: Many types of instruments and techniques are used in the instrumentation of the root canal system. These instruments and techniques may extrude debris beyond the apical foramen and may cause post-instrumentation complications. The aim of this study was to evaluate the amount of apically extruded debris resulted by using 4 types of nickel-titanium instruments (WaveOne, TRUShape 3D conforming files, Hyflex CM, and One Shape files) during endodontic instrumentation. Materials and methods: Forty freshly extracted human mandibular second premolar with straight canals and a single apex were collected for this study. All teeth were cut to similar lengths. Pre-weighted glass vials were used as collecting containers. Samples were randoml
... Show Moreبهذا البحث نقارن معاييرالمعلومات التقليدية (AIC , SIC, HQ , FPE ) مع معيارمعلومات الانحراف المحور (MDIC) المستعملة لتحديد رتبة انموذج الانحدارالذاتي (AR) للعملية التي تولد البيانات,باستعمال المحاكاة وذلك بتوليد بيانات من عدة نماذج للأنحدارالذاتي,عندما خضوع حد الخطأ للتوزيع الطبيعي بقيم مختلفة لمعلماته
... Show MoreThe performance of a condenser in a domestic refrigerator system without wires and a condenser with a novel design consisted of number of loops as elliptical shape is investigated experimentally in this work. The experiment was conducted with a refrigerator designed to work with HFC134a, under no load and with loads of (1.5,3 and 12 liters of water). In particular, the effects of shape change of the condenser were very important in heat transfer enhancement and reduce of the frictional loss as a result of reducing the pressure drop in the condenser. The results shown that compressor work decreases with elliptical condenser about (8.6% to 11.3%), and then the power consumption decreases also. The performance of household refrigerator with
... Show More