Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and international issues and positions, as well as the collapse of political infrastructure and the emergence of many challenges that threaten Iraqi societal security and civil peace.
Reading strategies are of interest for what they reveal about the ways readers manage their interaction with written texts and how these strategies are related to text understanding, acquisition ,storage ,and retrieval of information .In EFL comprehension lessons, the students try to work out interpretations of the meaning related to the written word through the usage of different comprehension strategies. Yet, there are moments where the participants in the classroom fail to reach a successful understanding of the passage read despite the guidance of the teacher. The present research aims at investigating and identifying moments of comprehension failure and reasons behind them .It also aims at specifying the different strategies used in
... Show MoreObjective: To know the recent shifts in the decision-making process and theories and stages, techniques and systems affecting it.
The need for research coming because of the problems that accompany the decision as a result of the failure Sometimes, poor visualization or the narrow perspective of decision-making than miss the opportunity to choose alternatives or options of the most effective and appropriate to solve a problem.
And has received exceptional decision-making process in administrative studies and research to enable the organization to continue its activities and its high efficiency, especially successful that the decision depends on the future,
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show Moreتواجه المجتمعات مشكلات متعددة أجتماعية وأقتصادية وثقافية تنعكس على التعليم فتزيد من مشكلاته و خاصة في عصر يتزايد فيه عدد السكان وبالمقابل يتزايد الطلب على التعليم ، لذلك يصبح التخطيط التربوي ضرورة ملحة للدول النامية أذ أن قطاع التربية والتعليم يعد من أهم قطاعات التنمية في تلك الدول ,ولكي تستطيع التربية أن تسهم في قطاعات التنمية قي تلك الدول الشاملة يجب أن تتصف بالجودة في كل عناصرها ومكوناتها وان
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show More