Preferred Language
Articles
/
AhilbpYBVTCNdQwCAYQi
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak of the Russian-Ukrainian war, which affected food supply chains and was important for wheat. The Gaza war caused consequent repercussions on energy crossings and supplies in the Eastern Mediterranean and West Asia. Owing to these factors, there have been repercussions on regional and international hubs and blocs in the Middle East. Additionally, the continued US-Iranian escalation on controversial issues worsened the situation. The US- Iranian influence essentially imposed

View Publication
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
The Synoptic Characteristics, Causes, and Mechanisms of Kahlaa Tornado in Iraq on 14th April 2016
...Show More Authors

In this study, an analysis of the synoptic characteristics, causes and mechanisms of Kahlaa tornado event was carried out. This tornado occurred on 10:30 UTC (1:30 pm Iraq Local Time) on 14 April 2016 to the north of Kahlaa town in Maysan governorate. We analyzed surface and upper charts, weather conditions, the damage indices, the dynamical features and the instability of the tornado. The analysis showed that there was a low pressure system which was an extension of the Monsoon low in addition to a supercell thunderstorm and a jet stream aloft. The cold trough and high relative vorticity at 500 hPa level, the humid warm wind blowing from the south and the dry cold wind from the north contributed to the initiation of the tornado. Accordi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Pyogenic Discitis in Female after Delivery and Pelvic Surgery
...Show More Authors

Background: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy

... Show More
View Publication Preview PDF
Publication Date
Fri May 16 2025
Journal Name
Journal Of Juridical And Political Science
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the

... Show More
View Publication
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
The changes in the thickness of 1000 – 500 MB and it effects the climate of Iraq
...Show More Authors

This research paper is about synoptic climate specifically with in the upper air layers
using upper air layers maps analysis which are maps of thickness for the level 1000 – 500
MB, that their high average ranges between 100 – 5600 M above surface. This research paper
focuses on studying special and temporal variations of the atmosphere thickness above Iraqaccording
to this study, it is concluded that atmosphere thickness above Iraq increases
towards south with an average of 100 M as compared with north of Iraq. Regarding the
temporal variations, it is concluded that atmosphere thickness during hot months. In July, for
example, the atmosphere thickness becomes thicker than in January with an average of
(250)M

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Molecular and Immunological Methods to Confirm Toxiginicity (Microcystin Production) of Westiellopsis Prolifica Isolated from Tigris River – Iraq
...Show More Authors

Several toxigenic cyanobacteria produce the cyanotoxin (microcystin). Being a health and environmental hazard, screening of water sources for the presence of microcystin is increasingly becoming a recommended environmental procedure in many countries of the world. This study was conducted to assess the ability of freshwater cyanobacterial species Westiellopsis prolifica to produce microcystins in Iraqi freshwaters via using molecular and immunological tools. The toxigenicity of W. prolifica was compared via laboratory experiments with other dominant bloom-forming cyanobacteria isolated from the Tigris River: Microcystis aeruginosa, Chroococcus turigidus, Nostoc carneum, and Lyngbya sp. signifi

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Advanced Security Technique in Presence of Open Communication System and Cyber Era
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATION OF ELECTRONIC TRADING AND CENTRAL DEPOSITERY IN THE IRAQ STOCK EXCHANGE FOR THE PERIOS (2008- 2018): EVALUATION OF ELECTRONIC TRADING AND CENTRAL DEPOSITERY IN THE IRAQ STOCK EXCHANGE FOR THE PERIOS (2008- 2018)
...Show More Authors

The rapid developmemt of information technology and its use in all fields has a bositive influence on all fields , and financial markets have a share of this development through the use of an electronic trading system to settle transactions and enhance transparency and disclosure in all activities of these markets and stimulate their performance .

It is worth nothing that these revolutions remove the necessity for nonstop connection with persons through the internet or phone networks , novel knowledge decreases the charges of structure original transaction system and reducing the fences of new participants entry .

The development in transportations expertise allows for quicker or

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation The Efficiency And Effectiveness of The Iraq stock Exchange -An Empirical Study From July 2004 to March 2008–
...Show More Authors

 The aim of this study was to provide an overall assessment to the efficiency of the Iraq stocks exchanges (ISE) through specifying well –known models .First, Fama's efficient market hypothesis as a contrary concept to the random walk hypothesis, was performed and it has been found that ISE follows the random process, so the price of the shares can't be predicated on the basis of past information. Second,we use a multifactor model, which so named multiple regression, to explore the link between ISE  and the main economic indicators. our empirical analysis finds that every weak associations exists between major ISE measures and main economic indicators.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2008
Journal Name
Political Sciences Journal
الامن الجماعي في اسيا ... بقلم : لونيك فرو وار
...Show More Authors

الامن الجماعي في اسيا .. بقلم : لونيك فرو وار

View Publication Preview PDF
Crossref