The military presence in the Gulf region after the British withdrawal from it in 1971 was one of the most important pillars of the American strategy to climb the ladder of global leadership, as the geostrategic features that the region enjoyed provided factors of controlling energy sources and global trade routes. The United States of America guarantees Western Europe and Japan the process of access to energy sources and the exclusion of its opponents from the region, especially the Soviet Union, and the growing American military presence in the Gulf after the invasion of Iraq in 2003. On the other hand, the region experiences many contradictions, some of which threaten its security, such as the exacerbation of disputes between its countries and the emergence of crises such as the crisis of the file of Iranian nuclear crisis, the Qatari crisis, the continuation of the Arab-Iranian disputes over the UAE islands, and the Bahrain problem, which ended with Saudi military intervention, as well as the war in Yemen. All of these problems occur with the intense US military presence in the region, which suggests a causal relationship between the US strategy adopted in the region and the continued security instability. Therefore, this research will address in detail the relationship between the American presence in the Arab Gulf region and the persistence of instability in it, especially after 2003.
Background: Pleomorphic adenoma of the minor salivary gland is a rare benign tumor. It commonly occurs in the hard and soft palates. Treatment by surgical excision achieved success in improving the patient’s health. Objective: To evaluate the recurrence rate after surgical treatment of pleomorphic adenoma in minor salivary glands. Methods: This retrospective study included patients who attended the Maxillofacial Surgery Unit in Ghazi Al-Hariri Hospital, Baghdad, from 2019 to 2021, complaining of soft tissue lumps involving the soft and hard palate, buccal mucosa, and upper lip. After the provisional diagnosis of these lesions, a total surgical excision of the tumor with a safe margin of 1 mm was performed, and the biopsy was sent
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
This research tries to reveal how to manage and control the competitive edge for business by building managerial skills in various organizational levels. Our research aims at finding out the nature of various technical, human and in tellectual skills of a new president whose superiority is his competitive ness in the application field at general company for construe tioual industriesand testing the surveyed minor and major changes through a questionnaire to collect information from officials. The sample was composed of (45) director. The data was analyzed using some methods and statistical programs. The most prominent of these is (SPSS) that was used to extract the arithmetic mean, standard deviation, correlation coefficient
... Show MoreThis research is intended to high light the uses of political content in foreign Arabic / speaking websites, such as “ CNN “ and” Euro News“, The research problem stems from the main question: What is the nature of the use of the websites in the political content provided through them? A set of sub-questions that give the research aspects and aims to achieve a set of objectives , including the identification of topics that included , the political content provided through , the sample sites during the time period for analysis and determine that the study uses descriptive research based on the discovery of the researcher, describing it accurately and defining the relations between the components.
The research conducted the des
Internal Audit is one of the most important backers of corporate governance, the researcher expanded his interest in this subject to examine the efficiency of Internal Auditors at the Arab Bank and its branches in Jordan to achieve Accountability which enhances the Corporate Governance and to identify the effect of the International Internal Audit Standards in strengthening the role of Internal Auditors in Accountability, and the effect of Attribute and Performance Standards in Accountability. The researcher applied descriptive analysis method to define the role of Internal Audit in the Arab Bank in achieving one of the basic principles of Corporate Governance assimilated in Accountability. The researcher’s sources include
... Show MoreThis study has contributed to identify convenience of the land Usifiya of Mahmudiya district baghdad province for the cultivation of sensitive and salt resisting crops and growing pasture .The nine pedons (tracks) of the study have spread over three transects to cover the whole area the north, middle and south .
Depending on Visual Space tupe (TM) for 2007 which is super classified, samples are distributed on all classes of land cover
It is detected the presence of nine series soils namely
MM5- MW96- DM 115 for 1st transect
MF12- DM46 - DM96 for 2nd transect
DM56- DF56 - MW5 for 3rd transect
Soils are classified to the level of sub great group according to (soil Survey Staff) to :
*Typic Torri Fluvents , Typic Haplos
The origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application.
... Show More