Preferred Language
Articles
/
BhjIbpYBVTCNdQwC2ISn
Strategies of Israeli National Security towards Syrian Border Cities after 2011 (Quneitra, Swayda, and Daraa)
...Show More Authors

Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. Meanwhile, sociopolitical values in Israeli society have undergone several changes since 2011, not to mention the continuing conflict with the Palestinians. This study, therefore, aims to elaborate on the concept of national security, differentiate national security from similar concepts, and identify the threats to Israel's national security, represented by challenges arising from actions without states in the Syrian border areas, namely Quneitra, Suwayda and Daraa. Also, this study demystifies the aspects of Israel's strategies to address these challenges after 2011. Thus, this study draws on three key border cities, Quneitra, Swayda, and Daraa, which are vital parts of Syria.

View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Arab Food's Security
...Show More Authors

Arab Food's Security

View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 08 2015
Journal Name
مجلة دراسات دولية
اليابان وإدارة الصراع في القارة الآسيوية منذ عام 2011
...Show More Authors

View Publication
Publication Date
Mon Jun 01 2015
Journal Name
السياسية والدولية
اشكالية الهوية في العراق رؤية في التحديات ومستقبل بناء هوية وطنية عراقية بعد العام 2003
...Show More Authors

لقد مثلت عملية التحول من النظام الشمولي الى مشروع اقامة نظام جديد ومغاير نقلة نوعية شهده المجتمع العراقي بعد 9/4/ 2003 القت بظلالها على مختلف الاصعدة السياسية والاقتصادية والاجتماعية، ولعل من بين ابرز تلك التحولات ذلك الذي تبلور على حول مفهوم الهوية الوطنية واعادة تشكيلها من خلال صياغة جديدة لمفهوم المواطنة الذي يفترض ان تكون القاعدة الراسخة التي يتأسس عليها المشروع الوطني الجديد الرامي الى إقامة او إعادة تأسي

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 02 2015
Journal Name
مجلة السياسية والدولية
اشكالية الهوية في العراق رؤية في التحديات ومستقبل بناء هوية وطنية عراقية بعد العام 2003
...Show More Authors

لقد مثلت عملية التحول من النظام الشمولي الى مشروع اقامة نظام جديد ومغاير نقلة نوعية شهده المجتمع العراقي بعد 9/4/ 2003 القت بظلالها على مختلف الاصعدة السياسية والاقتصادية والاجتماعية، ولعل من بين ابرز تلك التحولات ذلك الذي تبلور على حول مفهوم الهوية الوطنية واعادة تشكيلها من خلال صياغة جديدة لمفهوم المواطنة الذي يفترض ان تكون القاعدة الراسخة التي يتأسس عليها المشروع الوطني الجديد الرامي الى إقامة او إعادة تأسي

... Show More
View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Place Identity in Defining Urban Space of Border Rivers in Historical City Centres
...Show More Authors

In the city, building space could transform to be as place, because architecture does not include only traditional values such as housing, human protection, stability, etc, but could carry other dimensions beyond the housing or building occupancy or develop urban design. Rivers had vision in motion as a way to show dynamic processes in its flowing slowly, which are simply measured in time and the life of citizens. The research consider the river path in traditional cities as Alley connecting the spaces of the city ... old Baghdad was characterized by this property and it is look like Venice in the past, while traditional European cities were able to preserve this property till now, and capable to take transformation of the city with deve

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
On Blow-up Solutions of A Parabolic System Coupled in Both Equations and Boundary Conditions
...Show More Authors

This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.

View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref