111 research outputs found

    Blueprint for a catastrophe: conducting oil diplomacy by 'other means' in the Middle East and the Persian Gulf

    Get PDF

    The horn of Africa: regional conflict and super power involvement

    Get PDF
    Regional rivalries in the Horn of Africa have been intense for many centuries but never has there been such a clash between neighbours as the present full scale war between Ethiopia and Somalia. However this conflict is more than simply a local war between neighbours because of the involvement of the superpowers, the U.S.A. and the U.S.S.R., and several other regional powers. Furthermore it is a contest replete with dramatic changes and sudden switches of allegiance such as the shattering of the close military relationship between Ethiopia and the U.S.A., the expulsion of the Soviets from Somalia and the substantial military support given by the U.S.S.R. and Cuba to the embattled Ethiopians. Dr Ayoob examines the historical roots of conflict in the Horn of Africa, the impact of the European colonial powers, and the rise of the superpower involvement in the Horn. Of particular note are the great changes that taken place and the contradictions which have arisen in both the internal politics and the international alignments of Ethiopia and Somalia. After analysis of the war for the Ogaden he draws important conclusions regarding the extent to which the superpowers can achieve real and cost-effective influence both in this conflict and in regional conflicts generally

    A new method for watermarking color images using virtual hiding and El-Gamal ciphering

    Get PDF
    One of the important issues in the era of computer networks and multimedia technology development is to find ways to maintain the reliability, credibility, copyright and non-duplication of digital content transmitted over the internet. For the purpose of protecting images from illegal usage, a watermark is used. A hidden digital watermark is the process of concealing information on a host to prove that this image is owned by a specific person or organization. In this paper, a new method has been proposed to use an RGB logo to protect color images from unlicensed trading. The method depends on retrieving logo data from specific locations in the host to form a logo when the owner claims the rights to those images. These positions are chosen because their pixels match the logo data. The locations of matching pixels are stored in a table that goes through two stages of treatment to ensure confidentiality: First, table compression, second, encoding positions in the compressed table through El-Gamal algorithm. Because the method depends on the idea of keeping host pixels without change, PSNR will always be infinity. After subjecting the host to five types of attack, the results demonstrate that the method can effectively protect the image and hidden logo is retrieved clearly even after the attacks

    The Relation between Corporate Governance, Risk Management and Financial Performance: Theoretical and Analytics Framework

    Get PDF
    The paper aims to review the relation between Corporate Governance, Risk Management and Performance. We reviewed these variables and develop a Theoretical and Analytics framework. First introduction (study background, Problem Statement, Research Objectives and research questions). Second literature review (A) financial performance such as ROA, ROE, EPS and Tobin’s Q, (B) Corporate Governance as Board of Directors, Board Composition, CEO Duality and Board Size (C) Risk Management. Third, we discussed Underpinning Theories such as, Agency Theory and Institutional Theory. Fourth, we developed a Theoretical Framework where we illustrated (A) Corporate Governance and Financial Performance, (B) Risk Management and Financial Performance (C) Compliance with Accounting Standards and Financial Performance. Finally, we developed a comprehensive reviewing based on above variables

    Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs

    Get PDF
    Communication between mobile users is becoming more popular than ever before due to the recent technological advances in wireless communication devices. Ad hoc networks are generally closed in that, it’s a collection of two or more devices equipped with wireless communications and networking capability; they do not connect to the Internet and are typically created between participants. This means that a formed network can be de-formed on-the-fly without the need for any system administration. Many routing protocol methods have been proposed in Mobile Ad-Hoc Network but still the challenges are to improve the routing performance. The DSR (Dynamic Source Routing) routing protocol dependent on the cache memory for every node to store the routing path from source to destination. This paper presented a new algorithm using DSR routing cache technique to improve the routing between mobile nodes to reduction the effect of mobility in link transmitting that can solve link broken problem. The simulation results show a low delay, stable link in routing and better performance in terms of Route Discovery Time. It indicates that DSR cache outperforms DSR standard and had a high quality of packet delivery

    The Extraction of Alumina from Kaolin

    Get PDF
    Alumina has wide industrial and technological applications that can be extracted from different locations, different methods and materials. Kaolin from Iraq Alduikhla astrologer has used as a raw material source for alumina production. The alumina concentration in the Iraqi kaolin is more than 34% which considered as a good replacement for bauxite rack. Crushing andground is the first process to reduce the kaolin particle size to the micron level which increases the surface area of kaolin.The kaolin is heat treated at different temperatures (600, 650, 700 and 750) ̊C for 2 hours to remove some of ithe mpurity like organic materials and crystal water before acid treatment. A different concentration of hydrochloric acid (pH) (0.45, 0.5, 0.55, 0.6 and 0.65) has used for extraction of alumina from kaolin. The reaction between the hydrochloric acid and kaolin has studied at different temperature (30, 60 and 90) ̊C. The extraction of alumina has decreased with increase t inhe reaction temperature. Finally t,,he alumina extraction by this method has characterized using XRD and XRF to investigation the crystal structure and the amount of impurities presented there. The final extracted alumina h isaving cubic crystal structure (γ alumina) with purity above 95%

    INVESTIGATIVE STUDY OF THERMAL PERFORMANCE OF THERMOSYPHON SOLAR COLLECTOR

    Get PDF
    Experimental and Numerical investigation has been performed to improve the thermosyphon thermal performance. Optimization process concentrated on both the water and the operating liquid temperature inside the tank and the thermosyphon. For this purpose, three different models of improvement methods have been studied that depend on increasing the surface area with no changing in the volume of operating liquid. The first one (case-A-) is by add ten ring fins about the absorber pipe. The second method (Case-B-) is by add twenty ring fins about the absorber pipe. While, the third way (Case-C-) is by add ten ring fins with ten grooves about the absorber pipe. The thermosyphon thermal performance was compared between the traditional model and experimental model. Moreover, numerical simulate for all cases were done with computational fluid dynamic (CFD), ANSYS 19.R3. It was observed through the results that a good convergence between the numerical and, experimental results. Furthermore, the thermal performance for case-A- is found greater than all other cases under study

    An effective transmit packet coding with trust-based relay nodes in VANETs

    Get PDF
    ehicular ad-hoc networks (VANETs) are characterized by limited network resources such as limited bandwidth and battery capacity. Hence, it is necessary that unnecessary use of network resources (such as unnecessary packet transfers) is reduced in such networks so that the available power can be conserved for efficient multicast communications. In this paper, we have presented a Transmit Packet Coding (TPC) Network Coding in VANET to ensure reliable and efficient multicasting. With network coding, the number of transmitted packets over the network can be reduced, ensuring efficient utilization of network devices and resources. Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. The experimental results showed the superiority of the presented approach compared to the existing techniques in terms of throughput, latency, hop delay, packet delivery ratio, network decoder outage probability, and block error rate
    • …
    corecore