The military presence in the Gulf region after the British withdrawal from it in 1971 was one of the most important pillars of the American strategy to climb the ladder of global leadership, as the geostrategic features that the region enjoyed provided factors of controlling energy sources and global trade routes. The United States of America guarantees Western Europe and Japan the process of access to energy sources and the exclusion of its opponents from the region, especially the Soviet Union, and the growing American military presence in the Gulf after the invasion of Iraq in 2003. On the other hand, the region experiences many contradictions, some of which threaten its security, such as the exacerbation of disputes between its countries and the emergence of crises such as the crisis of the file of Iranian nuclear crisis, the Qatari crisis, the continuation of the Arab-Iranian disputes over the UAE islands, and the Bahrain problem, which ended with Saudi military intervention, as well as the war in Yemen. All of these problems occur with the intense US military presence in the region, which suggests a causal relationship between the US strategy adopted in the region and the continued security instability. Therefore, this research will address in detail the relationship between the American presence in the Arab Gulf region and the persistence of instability in it, especially after 2003.
What is the contract of cultivating the land of the waqf in Islamic jurisprudence and the Algerian Awqaf law
The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
The quality of the financial reports depends on set of accounting standards ,most of wich have been studied for the purpose of ascertaining the relationship between the standard used and the quality of the financial reports that contribute significantly to improving the financial performance of the institution, Research aims to detect the relationship between forensic accounting and the quality of financial reports, The research included a key hypothesis that forensic accountability could be applied to improve the quality of financial reporting, A sample of gentlemen (external auditors, tax assessors, judges, university professors, shareholders) (45
... Show MoreAbstract :-
The aim of the research is to explain the role of quality costs their importance and their classification, and to clarify the most important tools that help to reduce costs.
In order to achieve the objective of the research and test hypotheses adopted the descriptive approach, as well as the adoption of the analytical approach in the study of applied data has been relied upon in providing data on the financial and production reports of the research sample company, the data were used to study and analyze financial and productivity reports . A number of conclusions have been reached the most important being the following
... Show MoreComplexity is the inherent characteristic of contemporary organizations. It is characterized by the intertwining and expansion of its relations, by the severe disorder and rapid change in its environment, which makes it suffer from a state of uncertainty in determining the direction of its future or the assessment of the rules governing its paths. All organizations tend to evolve with increasing sophistication, And to take measures that contribute to the simplification of the system as it moves towards complexity, allowing the administration to easily control its movement and directions, and the problem of complexity in the university is based on the entanglement and overlap in the goals and processes betwe
... Show MoreThe research entitled: (The Constructive Mutation of installation Systems in the Artworks of the artist Ali Al-Najar) has dealt with the concept of Mutation and its systematizations in installation in the artworks of (Ali Al-Najjar).
The research has four chapters: The first Chapter deals with the methodological framework represented by the basic problem of the research, that is concerned with the constructive mutation of installation systems.
The research aims at finding out the constructive mutation of installation systems in the artwork of ( Ali al-Najar). The research is limited by analyzing visual samples of (Ali Al-Najjar) artworks betwen (1967-1991)
The second chapter deals with the theoretical framework, it has five s
Abstract
The study which carried( The important political development in
democracy Congo).initially deals with The important political events in African
country democracy Congo which know tow political period , and this study
divided tow chapter to expend these periods , the first chapter subject was the
period of mobotow 1965- 1997 . while the second chapter subject was abo
democracy Congo under the rule of loran cabeela who's comes to the rules of
the African country after he lead military movement agents' mobotow .
but the study have aconcluded that the political development in
democracy Congo happened because of the foreigner role , this role keep the
authority of mobotow and in the end let him down
The current research aims to determine the extent of the impact of the strategic direction to the business process reengineering, in the Office of the Ministry of Oil To reach that goal was a sample of community research study consisted (50) members of the senior leadership represent the problem in organization researched in the ambiguity of the strategic direction of knowledge of the compatibility of the strategic direction with Business Process Reengineering and used questionnaire, interview and observation to obtain the information needed to search was addressing data by the statistical system spss percentage and the arithmetic mean, standard deviation and coefficient of variation .
... Show More