The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the state issuing it does not take precedence over the interest of society as it is prevalent in traditional punitive laws (and the Iraqi law among them). In addition to the importance of expanding the legal diagnosis of images of indirect prejudice to social security that takes the form of media, economic and political activity, whether its source is internal or external. And presenting an integrated vision of state security that goes beyond the traditional formula in distinguishing between internal and external state security and considers the holistic character of the concept of state security in the modern era.
At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreThe introduction of the research on the science of training and the physiology of sports was addressed from important sciences, where the physical effort drew the attention of scientists since the past centuries when they studied how the body performs its functions when performing physical exertion and observe the changes that occur in it and write down and study especially the positive effects of the practice of daily sports The aim of the study was to investigate the effect of plank exercises on the lipid component and the metabolic rate (bmr) of the female students of the Higher Institute for Security and Management Development. As for the third chapter, the two researchers used the experimental method on a sample of the female s
... Show MoreThe objective of the study: To diagnose the reality of the relationship between the fluctuations in world oil prices and their reflection on the trends of government spending on the various economic sectors.
The research found: that public expenditures contribute to the increase of national consumption through the purchase of consumer goods by the state for the performance of the state's duties or the payment of wages to employees in the public sector and thus have a direct impact on national consumption
The results of the standard tests showed that there is no common integration between the oil price fluctuations and the government expenditure on the security sector through the A
... Show MoreLive the present companies in a competitive business environment going on and try to achieve excellence in their industry through the marketing of their products and achieve greater market share as possible to ensure its continued existence, and perhaps the concept of time production, which confirms, in essence, on the need to reduce inventory to a minimum in the production process as well as the concept of the marketing information system which asserts, in essence, to document all the events that are related to the marketing of the product provided by the production process, together constitute the subject deserves research and investigation as they have raised well-known in the fields of production management and marketing management.
... Show MoreThe accession of countries to the World Trade Agreement and the openness of markets to each other without restrictions led to the emergence of the philosophy of "a world without borders and business units without countries", which required adapting the modern business environment to that philosophy, which is considered as objectives for the activities of the units that must be implemented in order to achieve competition. The objective of the units has changed from making profit to meeting the desires of customers, which is what imposed a new role for management accounting as a field of knowledge renewed in it visions of competitiveness between units. Because of the increasing needs for information in light of environmental change
... Show MoreLuffa aegyptiaca is a plant of multi-purpose importance whose usefulness cuts across virtually all areas of life. This study has characterized L. aegyptiaca in Lagos state and determined the mineral, proximate, phytochemical as well as the heavy metal accumulation potential. Samples were collected from the 20 Local Government Areas (LGAs) in Lagos state at 2 samples per location. Genetic similarity and intra-specific variation in 40 samples of L. aegyptiaca were determined using 3 Random Amplified Polymorphic DNA (RAPD) primers which yielded a total of 42 markers of which 25 was polymorphic. The maximum number of bands (14) was produced by OPC4 while the minimum (7) were produced by OPAF20. Percenta
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show More