Abstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under equipped blue helmets have struggled to carry out ambitious mandates while facing severe challenges in the Central African Republic, Mali, South Sudan and elsewhere, only thinly papered over by the international responses to date.
GA Al Omran, AA Noaimi, Z Al Madfai, H Al Hamamy, Journal of the Faculty of Medicine Baghdad, 2012
A study conducted a laboratory experiment to measure the release of potassium and the dissolution of feldspar minerals in soils from different locations in Karbala Province (Ain Al-tamur, Qasr Al-Akhyar, Fadak Farm). The study involved the addition of organic acids (fulvic and humic) and mineral acids (sulfuric and phosphoric) at concentrations of 5% and 10% to sand-separated soil samples obtained through wet sieving. Feldspar minerals were identified using a polarized light microscope, and the percentage of each type of feldspar mineral was calculated. The results demonstrated that organic acids outperformed mineral acids in releasing potassium at both concentrations. Among the organ
Background: Cisplatin is one of the most
commonly used anti-cancer drugs , but its
clinical use was limited by its nephrotoxicity .
Methods: In this study we try to investigate the
renoprotective effect of captopril and
aminophylline against cisplatin induced
nephrotoxicity .For this purpose a 36 Sprague
Dawley rats was divided randomly to 6 groups ,
each group consist of 6 rats. The first group
given normal saline and act as control group,
while the other 5 groups given cisplatin ( 7.5
mg/kg ) , captopril ( 60 mg/kg ) , aminophylline
( 24 mg/kg ) , captopril with cisplatin and
aminophylline with cisplatin respectively. All
drugs are given as single dose through
intraperitonial route. After 6
In this research, A thin film of Rhodamine B dye and TiO2 Nanoparticles doped in PMMA Polymer has been prepared by a casting method. The sample was spectrum absorption by UV-Vis. The nonlinear optical properties were measured by Z- scan technique using Nd:YAG laser with (1064 nm) wavelength. The nonlinear refractive index (n2) and nonlinear absorption coefficient (β) were estimated for the thin film for different energies of the laser, n2 and β were decreased with increasing intensity of incident laser beam. Also, the type of β was two-photon absorption and n2 negative nonlinear reflective.
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreWith their strategic and geographical positions, Japan and Iraq are one of the major
countries in the world, especially to the United States. Japan lies near the two American
Continents, separated only by the Pacific and it is only normal to have the interests of both
countries crossed and joined in the Far East region. This made the occupation of Japan an
inventible matter in the second half of the 20th century. Iraq, on the other hand, has strategic
position in the Middle East, being surrounded by many active countries like Turkey, Iran, and
Gulf countries, besides Iraq’s oil wealth which is needed by such industrial country like the
United States.
As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More