The achievement of world peace is a humanitarian demand that humanity has sought since its existence. Despite the international and regional efforts to achieve this demand, it is still reaching its desired ambitions if conflicts, contradictions, and internal and external wars continue to justify us clearly in terms of ethnic, religious and sectarian conflict. The revolution of informatics and the impact of globalization opened a new era of communication and openness and the negative and positive impact of others, which re-published and distributed values, ideas and new cultures Some of them carries extremist ideas urging violence and destruction and other abolition, it became necessary to follow policies and reward The culture of peace, the rejection of violence, extremism and ignorance, and the strengthening of trust, cooperation, love and tolerance among peoples, where a culture of peace creates a new generation that believes in the existence of others and their active participation in building the international community based on the values and values of freedom, equality and justice. Manifestations of intolerance of violence, terrorism, xenophobia, racial, national, sectarian and religious conflicts, exclusion, marginalization, exclusion and discrimination against national, ethnic and linguistic minorities, refugees, migrant workers, Secondly, the study stresses the importance of the elements of international tolerance in order to promote and establish world peace, particularly in light of the escalation of the role of terrorism and extremist religious movements based on violence, tolerance and the elimination of the other, Tolerance is a political, cultural and moral necessity based on international legal foundations represented by the United Nations through its conferences, declarations, international resolutions and specialized agencies, culminating in the Universal Declaration of Tolerance and World Day for International peace
Abstract
Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t
... Show MoreThe importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing i
... Show MoreThe American-European dispute is one of the important issues that dominated international relations during the nineteenth century in particular, although the previous period witnessed the emergence of a dispute over the right to control these colonies, which the United States of America, especially after the proclamation of the Monroe Doctrine in 1823, is a natural right and that It has the ability to prevent European countries from interfering in the affairs of the American continent, so the United States of America entered into continuous disputes with European countries, which were constantly directing their eyes towards the Spanish colonies in the American continent. But the American government had priority in controlling those colonies
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More