Preferred Language
Articles
/
BhjIbpYBVTCNdQwC2ISn
Strategies of Israeli National Security towards Syrian Border Cities after 2011 (Quneitra, Swayda, and Daraa)
...Show More Authors

Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. Meanwhile, sociopolitical values in Israeli society have undergone several changes since 2011, not to mention the continuing conflict with the Palestinians. This study, therefore, aims to elaborate on the concept of national security, differentiate national security from similar concepts, and identify the threats to Israel's national security, represented by challenges arising from actions without states in the Syrian border areas, namely Quneitra, Suwayda and Daraa. Also, this study demystifies the aspects of Israel's strategies to address these challenges after 2011. Thus, this study draws on three key border cities, Quneitra, Swayda, and Daraa, which are vital parts of Syria.

View Publication
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
The Level of Mental Alertness and Its Relationship to Academic Self-Efficacy among Northern Border University Students
...Show More Authors

Abstract

This study aims at investigating the relationship between mindfulness and academic self-efficacy among Northern Border University students. To achieve this objective, the researcher adopted the correlative survey method for (97) students. For data collection, the researcher developed a mindfulness scale consisting of (42) items divided into seven topics, each one consisting of six items. The researcher developed an academic self-efficacy scale consisting of (20) items, adopting a five-point Likert scale. The results showed that there is a high level of mindfulness among students at the level of the seven units which formed the mindfulness scale; the conscious thinking unit showed the highest mean value o

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
مجلة العلوم السياسية
مستقبل الحرب الروسية- الاوكرانية ومدى انعكاسها على أمن دول شرق اوربا بعد العام 2022
...Show More Authors

تعد الحروب أحد أخطر التهديدات في النظام العالمي; فهي تعد خرقا للقوانين والاعراف الدولية، والمبادئ الإنسانية، و من هنا تأتي دراسة أهمية موضوعنا الموسوم بـ (الاحتمالات المستقبلية للحرب الروسية – الأوكرانية و مدى انعكاسها على أمن دول شرق أوربا بعد العام 2022 ،)اذ يرتكز هذا البحث على دراسة واستعراض الاحتمالات المستقبلية )السيناريوهات) للحرب الروسية – الأوكرانية، والتي شنت من الحكومة الروسية بقيادة الرئيس الروس

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Theoretical structure of Eco-cities: subject review
...Show More Authors

Given the importance of ecology and its entry into various fields in general and the urban environment particularly; ecological cities take wide ranges of application at multiple regional and global levels. However, it repeatedly noted that there was a state of cognitive confusion and overlapping in the term ecology comes from the diversity of implementation within several disciplines. Architects, designers, and planners have instilled biological development directly into the formal principles as well as the social structures of the ecological cities. Therefore, the research presents a rapid review of the most relevant areas that dealt with the ecological cities by research and analysis at various levels, from the concept and definition of

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Theoretical structure of Eco-cities: subject review
...Show More Authors
Abstract<p>Given the importance of ecology and its entry into various fields in general and the urban environment particularly; ecological cities take wide ranges of application at multiple regional and global levels. However, it repeatedly noted that there was a state of cognitive confusion and overlapping in the term ecology comes from the diversity of implementation within several disciplines. Architects, designers, and planners have instilled biological development directly into the formal principles as well as the social structures of the ecological cities. Therefore, the research presents a rapid review of the most relevant areas that dealt with the ecological cities by research and analys</p> ... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
On Blow-up Solutions of A Parabolic System Coupled in Both Equations and Boundary Conditions
...Show More Authors

This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.

View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref