Preferred Language
Articles
/
AhilbpYBVTCNdQwCAYQi
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak of the Russian-Ukrainian war, which affected food supply chains and was important for wheat. The Gaza war caused consequent repercussions on energy crossings and supplies in the Eastern Mediterranean and West Asia. Owing to these factors, there have been repercussions on regional and international hubs and blocs in the Middle East. Additionally, the continued US-Iranian escalation on controversial issues worsened the situation. The US- Iranian influence essentially imposed

View Publication
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Sun May 12 2024
Journal Name
المؤتمر العلمي الدولي الثالث للعلوم الاجتماعية والإنسانية بعنوان (دور الجامعات في تطوير النظام التعليمي وفق متطلبات التنمية المستدامة
The Strategies of Individuality to Resist Authority: Foucauldian Study of Orwell’s 1984 and Antoon’s I’jaam
...Show More Authors

To approach the problem of individual oppression with an international perspective drawing on Foucauldian concepts, this paper compares George Orwell’s 1984 (1949) and the Iraqi Sinan Antoon’s I’jaam (2004), which was translated into English in 2007. Even though Orwell and Antoon come from dissimilar cultural backgrounds, religions and epochs, they have tackled the issue of individuals’ oppression through their oppressed characters in a strikingly similar way. Hence, by applying the theories of both the American School of Comparative Literature and Foucauldian concepts, the current study attempts to establish a relationship between the Western and Eastern ways of dealing with the issue of oppression as an international problem in au

... Show More
View Publication
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The impact of the market knowledge to improve marketing performance an empirical study for mobil communication companies in iraq
...Show More Authors

       The study aimed to determine the extent of market knowledge in the companies researched, as if market knowledge is qualified to lead the companies researched to achieve marketing performance , for this purpose, formulated hypotheses of the study in three hypotheses, the first major hypothesis "there is a correlation with significance of market knowledge to improve the marketing performance  , "while the second major hypothesis, "there is a significant moral influence of market knowledge to improve the marketing performance  " these hypotheses targeting to determine the role played by market knowledge in the leadership of companies researched to achieve improvement in marketing perfor

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of progressive income tax on inflation in Iraq for the period from 1995 to 2020 : applied research
...Show More Authors

                Inflation is one of the important issues that the economic authorities in all countries of the world care about, where the loss of money for its function is one of the most important and largest inflationary effects that this phenomenon leaves on the economy, and Iraq, like other countries, has had its share of the problem of inflation for a long time due to the circumstances that He went through it, whether it was the wars he fought or the economic blockade that was imposed on him in the nineties of the last century. Economically, the problem of inflation is addressed through the use of fiscal policy tools, including tax increases in order to abso

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 17 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of progressive income tax on inflation in Iraq for the period from 1995 to 2020 : applied research
...Show More Authors

                Inflation is one of the important issues that the economic authorities in all countries of the world care about, where the loss of money for its function is one of the most important and largest inflationary effects that this phenomenon leaves on the economy, and Iraq, like other countries, has had its share of the problem of inflation for a long time due to the circumstances that He went through it, whether it was the wars he fought or the economic blockade that was imposed on him in the nineties of the last century. Economically, the problem of inflation is addressed through the use of fiscal policy tools, including tax increases in order to abso

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 22 2022
Journal Name
Journal Of Al-turath University College
The Turkish role in the US-Iran Crisis (2017-2020)
...Show More Authors

New developments imposed different patterns of interactions between major international powers and Iran during 2018, ranging to varying degrees between cooperation and tension, the most important of which is the new measures taken by the United States to withdraw from the nuclear agreement and impose new US sanctions on Iran, which in turn insisted on not responding to pressure to which they are exposed to make changes in their policies and to negotiate again about the main contentious files, especially the nuclear program and ballistic missiles, and the roles they play for crisis countries, especially supporting some armed organizations in Syria, Lebanon, Iraq and Yemen. These differences have put the international forces before difficult

... Show More
View Publication
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
The Counselor Brent Scowcroft and his Role in Achieving the Requirements of the American National Security
...Show More Authors

       Despite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Tue Apr 01 2025
Journal Name
Sustainable Materials And Technologies
Current developments in the use of nanotechnology to enhance the generation of sustainable bioenergy
...Show More Authors

View Publication
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref