Preferred Language
Articles
/
FRcu7Y4BVTCNdQwCuFpa
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the state issuing it does not take precedence over the interest of society as it is prevalent in traditional punitive laws (and the Iraqi law among them). In addition to the importance of expanding the legal diagnosis of images of indirect prejudice to social security that takes the form of media, economic and political activity, whether its source is internal or external. And presenting an integrated vision of state security that goes beyond the traditional formula in distinguishing between internal and external state security and considers the holistic character of the concept of state security in the modern era.

View Publication
Publication Date
Fri Sep 30 2022
Journal Name
Industrial Engineering & Management Systems
Optimizing the Complex Systems Reliability Using Mixed Strategy in Ultra-fast Gas Turbine Protection System
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Sun Oct 17 2021
Journal Name
Iraqi Journal Of Physics
The effect of inorganic pigment on the tensile properties of polycarbonate irradiated with UV – light
...Show More Authors

The effect of UV-light on the tensile properties of pure PC has been studied. It was shown that irradiation of PC undergo a drop in the tensile properties of 30 hour of exposure. The results of irradiated samples shows that the addition of ZnO and TiO2 with different percentages (0.5, 1, 1.5 %) will reduce the Young modulus and ultimate stress of PC/ZnO ,PC/ TiO2 composites

View Publication Preview PDF
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
An Analysis on the Applicability of Meta-Heuristic Searching Techniques for Automated Test Data Generation in Automatic Programming Assessment
...Show More Authors

Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Sun Oct 06 2024
Journal Name
International Journal Of Advances In Engineering And Management (ijaem)
The makers of sedition in light of Chapters (Al-Baqarah and Yusuf)/An objective study
...Show More Authors

The makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in seve

... Show More
Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Relationship between the central government and local governments in the light of the centralized and decentralized administrative
...Show More Authors

Gaining the relationship between the central government and local governments is great importance especially after the expanded functions of the central government and became unable to carry out their works without all that delegate or transfer parts of its powers to lower levels.

The aims of the research is  to determine the relationship of the central government with the local government in accordance with the principle of administrative decentralization with the presentation of the competent authorities, the control of local governments, according to the Provincial Council Act No. 21 of 2008 amended.

The research has a problem that has been the relationship of the central

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The mechanisms of generation of Unemployment in Iraq and its types and calculating the Disguised of it: Analytical Study for the period 2003-2015
...Show More Authors

     The objective of this study is to attempt to provide a quantitative analysis to the causes of unemployment  in Iraq and its mechanisms of generation, as well as a review of the most important  types of both visible and invisible unemployment, and an attempt to measure the disguised  unemployment  and analyze the causes. The problem of the research lies in the fact that the Iraqi Economy has been suffered  for  a long time although its characterized by abundant  physical and natural  resources, from the existence of the  phenomenon of unemployment  in the previous two types. Causing a lot of economic problems, represented by the great waste of resources and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 31 2022
Journal Name
Journal Of The College Of Education For Women
Evaluating Teacher Preparation Programs in Scientific Disciplines at the Faculty of Education in Al-Aqsa University in Light of the Requirements of the Labor Market
...Show More Authors

The current study seeks to evaluate teacher preparation programs in the scientific disciplines at the College of Education in Al-Aqsa University in the light of the requirements of the labor market. It further aims to reveal the significance of the differences in the sample members’ response averages of to the availability of labor market requirements in the program that prepares the teacher of scientific disciplines at the Faculty of Education in Al-Aqsa University taking into account the (gender, program) variables. The study followed the descriptive analytical approach, and so a questionnaire was distributed to a sample of scientific discipline students in the teacher preparation program adopted in Al-Aqsa University, (200) male and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The Problems of Teaching Computer Material Concerning Fourth Grade Students’ Point of View of in the Department of Computer College of Education for Women / University of Baghdad
...Show More Authors

The aim of the research is to identify the problems of teaching computer material concerning fourth grade students’ point of view in the computer department in the College of Education for Women by identifying the statistically significant differences between the answers of female students to problems in the field of school administration and in the field of teaching computer subject included the sample of research On (39) of (50) students and (78%) From the fourth grade students in the department of computer who had achieved the theoretical part in the first semester and the assembly application in the second semester in the schools of Baghdad city for the aca

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Webology
The role of change management in achieving competetive advantage a case study in diyala state company
...Show More Authors

The research aims to test the correlation relationships between wise leadership, and the business model, and to demonstrate its influence (wise leadership) on the business model. Therefore, two main hypotheses were put forward. The research was applied to a sample consisting of (87) managers and deputy managers, some of them are members on the board of directors of the researched company. The questionnaire was adopted as a basic tool for collecting data, in addition to personal interviews. A number of statistical methods were used to analyze the data and obtain results. The researcher showed a set of results, including: There is a significant correlation between wise leadership and business model. There is an influence of wise leadership on

... Show More