Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and international issues and positions, as well as the collapse of political infrastructure and the emergence of many challenges that threaten Iraqi societal security and civil peace.
لكل دولة في هذا العالم خطابها السياسي والذي يحدد سياستها الداخلية والخارجية، وهي سياسة ثابتة تنطلق من مفاهيم وبرامج وثوابت تخدم مصالحها الحيوية، لكون الخطاب السياسي ليس مجرد كلام عابر في عالم السياسة الدولية وانما هو ثوابت مهمة يحدد توجهات هذه الدولة او تلك ويحدد دورها الدولي وطبيعة العلاقة مع البلدان الاخرى ومنها الدول المجاورة لها. شهد العراق بعد العام 2003 تحديات جديدة تمثلت بتغليب خطابات الطائفية والكراه
... Show MoreCoronavirus diseases 2021 (COVID-19) on going situation in Iraq is characterized in this paper. The pandemic handling by the government and the difficulties of public health measures enforcement in Iraq. Estimation of the COVID-19 data set was performed. Iraq is endangered to the pandemic, like the rest of the world besides sharing borders with hotspot neighbouring country Iran. The government of Iraq launched proactive measures in an attempt to prevent the viral spread. Nevertheless, reports of new cases keep escalating leaving the public health officials racing to take more firm constriction to face the pandemic. The paper bring forth the current COVID-19 scenario in Iraq, the government measures towards the public health challenges, and
... Show Moreكلية الفنون الجميلة بين تقادم المعرفة وعصر التحديات
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Research in the field of English language as a foreign language (EFL) has been consistently highlighted the need for communicative competence skills among students. Accompanied by the validated positive impact of technologies on students’ skills’, this study aims to explore the strategies used by EFL students in enhancing their communicative competence using digital platforms and identify the factors of developing communicative competence using digital platforms (linguistic factors, environmental factors, psychological factors, and university-related factors). The mixed-method research design was utilized to obtain data from Iraqi undergraduate EFL students. The study was conducted in the Iraqi University in Baghdad Iraq. EFL undergradu
... Show MoreThe characters of facades' form of the Iraqi building after 2003 have been changed, it has been described by many names. The problem of the research is that what are the features of the characters of the form in the façades of the buildings in Baghdad city after 2003? Are the façade of the individual houses or the commercial buildings is the heaviest in the visual weight? The research aims to answer those questions by choosing the vernacular architecture as a measurement tool. It is the informal image of the architecture, which is built by people informally and spontaneously, without official control and legislation to be organized. This is smellier to what has happened in Baghdad, after 2003 according to previous stud
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreAspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.
The common history of Latin America countries may contribute significantly to determine the initial beginnings of these States since the current borders are a reflection and drawing of the borders of Antarctica according to the divisions determined by the behavior of the Portuguese and Spanish colonialism as well as what the Pope originally called for in order to divide property between Spain and Portugal. A later change took place especially after the independence in the first quarter of the 19th century for the majority of those States which is something that imposed special consideration in the analysis and description of each of these States. There are constants and variables in this case where all the States share constants, while t
... Show More