As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak of the Russian-Ukrainian war, which affected food supply chains and was important for wheat. The Gaza war caused consequent repercussions on energy crossings and supplies in the Eastern Mediterranean and West Asia. Owing to these factors, there have been repercussions on regional and international hubs and blocs in the Middle East. Additionally, the continued US-Iranian escalation on controversial issues worsened the situation. The US- Iranian influence essentially imposed
The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreAbstract:
Objective: The study’s aim to evaluate the effectiveness of instructional program about healthy lifestyle on patients’ attitudes after undergoing percutaneous coronary intervention.
Methodology: Quasi-experimental design/ has been utilized for the current study starting from December 2018 to March 2020 to achieve the objectives of the study. Non-probability (purposive) sample of 60 patients was divided into intervention and control groups. Data were analyzed by the application of descriptive and inferential statistical methods.
Results: findings reported that before intervention both study and control groups demonstrated low total mean of score relat
... Show MoreTransportation network could be considered as a function of the developmental level of the Iraq, that it is representing the sensitive nerve of the economic activity and the corner stone for the implementation of development plans and developing the spatial structure.
The main theme of this search is to show the characteristics of the regional transportation network in Iraq and to determine the most important effective spatial characteristics and the dimension of that effect negatively or positively. Further this search tries to draw an imagination for the connection between network as a spatial phenomenon and the surrounded natural and human variables within the spatial structure. This search aiming also to determine the nat
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThe problem of the study is to monitor the content presented in the Iraqi satellite channels to identify the nature of the ideas contained in these ads and to identify the values carried by the creative strategies and ad campaigns that use. Where the satellite is one of the most important technological developments in the field of communications in the nineties and the ads in various forms and functions one of the contents provided by satellite channels where these channels are keen to direct their messages in particular and communication, in general, to address a certain audience and convince and influence in order to achieve certain purposes of the source Or the body from which it originates, especially those that result in an in
... Show MoreThere Are Many Communities Suffering Of Unemployment Due To Has Great Social And Economic Impact, As Well As The Psychological Effects Devastating And Serious And That May Threaten States With Collapse And Leading Human Displacement And Loss And Crime, And Often Derive Unemployed People To Practice Bad Habits Such As Gambling, Alcohol And Drug Abuse To Escape From Their Reality To Their Concerns And Problems.
It Should Be Noted, That The Largest Percentage Of Unemployment In Developing Societies Represented By The Educated Class Of University Graduates, And This Is Something Painful.
The Unemployed Know That (Each Capable Of Working And Who Want To Look For And Accept Prevailing Bricks) Is Th
... Show MoreIraq is changing from the centralized system of governance to the decentralized system, which assumes devolution of more authorities to the local governments of Iraqi provinces and cities. This puts a responsibility on the academics to produce more research work on the best framework for this change, to ensure the best results. The main objective of this research is to suggest a policy for the decentralized transformation in domain of Urban and Regional Planning in Iraq. A suggested program for the transformation is involved in the paper as well, with analysis for the new relationships between different levels of planning authorities depending on democracy. In addition, a description for planning process flows from bottom to top.
The deficit of the federal budget and the structural imbalances suffered by the Iraqi economy has affected the direction of research towards suggesting steps and mechanisms can be relied upon in the near term to form a broader base of non-oil revenues aimed at achieving a balanced budget, and to proceed to reform the financial situation, In reducing their financial dictates, whether capital or operational, which lead to significant financial and economic consequences. This also requires that the Iraqi political elite have the real will, strategic vision and full awareness that the implementation of these reforms has potential social and economic effects, with long-term measures to be taken. The aim is not only to reform the finan
... Show More