Preferred Language
Articles
/
FRcu7Y4BVTCNdQwCuFpa
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the state issuing it does not take precedence over the interest of society as it is prevalent in traditional punitive laws (and the Iraqi law among them). In addition to the importance of expanding the legal diagnosis of images of indirect prejudice to social security that takes the form of media, economic and political activity, whether its source is internal or external. And presenting an integrated vision of state security that goes beyond the traditional formula in distinguishing between internal and external state security and considers the holistic character of the concept of state security in the modern era.

View Publication
Publication Date
Wed Apr 26 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Video Copyright Protection
...Show More Authors

Illegal distribution of digital data is a common danger in the film industry, especially with the rapid spread of the Internet, where it is now possible to easily distribute pirated copies of digital video on a global scale. The Watermarking system inserts invisible signs to the video content without changing the content itself. The aim of this paper is to build an invisible video watermarking system with high imperceptibility. Firstly, the watermark is confused by using the Arnold transform and then dividing into equal, non-overlapping blocks. Each block is then embedded in a specific frame using the Discrete Wavelet Transform (DWT), where the HL band is used for this purpose. Regarding the method of selecting the host frames, the

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 30 2018
Journal Name
Risalat Al-huquq Journal
Legal protection for producers of phonograms in Iraqi law
...Show More Authors

Piracy on phonograms is now, rightly, the crime of the electronic age. Despite the protection sought by States to provide for such registrations, whether at the level of national legislation or international agreements and conventions, but piracy has been and continues to pose a significant threat to the rights of the producers of those recordings, especially as it is a profitable way for hackers to get a lot of money in a way Illegal, which is contrary to the rules of legitimate competition. Hence, this research highlights the legal protection of producers of phonograms in light of the Iraqi Copyright Protection Act No. (3) of 1971, as amended.

View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Professional Safety
Shedding Light on the Concept of Social Equity in SUSTAINABLE CONSTRUCTION
...Show More Authors

Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Integrating the role of internal and external audit to ensure the success of the assessment methodSelf-General Authority of Taxation
...Show More Authors

المقدمة

تتعامل الجهات الضريبية في مختلف دول العالم بأساليب عديدة لجباية الضرائب من المكلفين بغض النظر عن فئات وأصناف هؤلاء المكلفين،وفي العراق تم اعتماد العديد من الأساليب لجباية الضرائب على امتداد المدد الزمنية المتعاقبة،وكان لأسلوب التقدير الذاتي وهو أحد تلك الأساليب مجالاً للتطبيق خلال مدة زمنية معينة،حيث جرى تطبيق هذا الأسلوب على وحدات اقتصادية معينة، وبالرغم من المساوئ التي قد ترافق تطبيق

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Consumer protection in e-marketing contracts An analytical study.: Consumer protection in e-marketing contracts An analytical study.
...Show More Authors

Marketing plays a role in the transfer of consumer desires through research, studies and satisfy the needs process, and with the technical development has evolved and marketing departments in the world of commerce has made great strides since the expansion of the trade deal, especially in light of spread of the Internet and the culture of use where he became a lot as individuals or institutions are dealings via electronic shopping . In all cases, we find that the consumer is important party, and that the legal rules did not leave the shopping process or contracting E without protection and I've dealt with so many studies through the civil protection for the consumer in electronic contracts legally with an analytical study of the

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analysis of the performance of the stock market in light of inflation : empirical research in the Iraqi Stock Exchange
...Show More Authors

Abstract:

                The aim of this research to try to determine the type of expected relationship between inflation as the explanatory variable and market performance as a dependent variable, for that used data issued and published by the Central Bank of Iraq and the Iraqi Stock Exchange for a sample consisting of (159) observations using the intentional or intentional sampling method for the period extending between the months (January 2010 to March 2023), in the light of each of the Consumer Price Index (CPI), the Iraqi Stock Exchange Index, the number of traded shares and the number of market capital shares to ex

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
The requirements of agricultural investment in Iraq in light of his accession Of the World Trade Organization
...Show More Authors

Abstract              
          Agricultural investment is one of the main requirements in most economies of the world for its importance in the development of the agricultural sector through the agricultural and technological infrastructure and agricultural research, as well as its impact on most economic, social and service activities, especially if managed and employed scientifically, which generates income and productive capacities and services and new commodities, Unemployed as agricultural investments in Iraq fell significantly after 2003 due to economic, political, social

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 25 2021
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Impact of CATs on Mathematical Thinking and Logical Thinking Among Fourth-Class Scientific Students
...Show More Authors

The aim of the research is to find out the effect of applying classroom assessment techniques (CATs) on both mathematical and logical thinking among fourth-grade scientific students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught in the traditional way and the other experimental taught according to the techniques of classroom structural evaluation. The research sample consisted of (44) students from the fourth scientific grade who were intentionally chosen after ensuring their equivalence in several factors, most notably chronologi-cal age and the level of mathematics, and they were distributed equally among the t

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The crisis of the Arab regional system between internal reforms and external interventions
...Show More Authors

Passes the Arab order moment political precision of disruption and discord and
differences of countless between its components and its parts because of the suffering he
endured and the suffering now from internal disturbances as a result of lack of cohesion
relations intra-and cultural, historical and lack of interaction between these components so
that became the focus of the policies and interests is an unprecedented degree , reduced with
the joint Arab action to the minimum, and began to focus on the interests of special
regulations.
This is with regard suffering internally, but externally the regime Arab Regional is absent the
biggest influence on international decisions because of the courtesies which were ca

... Show More
View Publication Preview PDF