Preferred Language
Articles
/
FRcu7Y4BVTCNdQwCuFpa
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the state issuing it does not take precedence over the interest of society as it is prevalent in traditional punitive laws (and the Iraqi law among them). In addition to the importance of expanding the legal diagnosis of images of indirect prejudice to social security that takes the form of media, economic and political activity, whether its source is internal or external. And presenting an integrated vision of state security that goes beyond the traditional formula in distinguishing between internal and external state security and considers the holistic character of the concept of state security in the modern era.

View Publication
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The objective Effect of Internal and External Environment and its Psychological & Practical Reflection on the Political Decision-Making Process
...Show More Authors

The objective Effect of Internal and External Environment and its Psychological & Practical Reflection on the Political Decision-Making Process

View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Robust Queues Models and its Role in Improving Performance in the City of Medicine / Baghdad Teaching Hospital / Clinic Internal Medicine Advisory
...Show More Authors

The purpose of this research is to a treatment the impact of Views outliers to the estimators of a distributed arrival and service to the theory of queues and estimate the distribution parameters depending on the robust estimators, and when he was outliers greatest impact in the process of estimating the both distributions mentioned parameters, it was necessary to use way to test that does these data contain abnormal values ​​or not? it was used the method ( Tukey ) for this purpose and is of the most popular ways to discover the outliers , it shows that there are views abnormal (outliers ) in the estimators of each of the distributional arrival and service, which have a significant impact on the calculation of these estimato

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Using modern techniques for determining the location of marketing outlet for product of the state company for vegetables oil
...Show More Authors

Were arranged this study on two sections, which included first section comparison between markets proposed through the use of transport models and the use of the program QSB for less costs , dependant the optimal solution  to chose the suggested market  to locate new market that achieve lower costs in the transport of goods from factories (ALRasheed ,ALAmeen , AlMaamun ) to points of sale, but the second part has included comparison of all methods of transport (The least cost method ,Vogels method , Results Approximations method , Total method) depending on the agenda of transport, which includes the market proposed selected from the first section and choose the way in which check the solution first best suited in terms

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Shift towards Digital Education According to Vision 2030 in Light of Some Variables from the Perspective of Workers with Disabilities
...Show More Authors

The current study aimed to measure the attitudes of female teachers towards the use of digital learning and the degree of possessing their digital education skills. The study sample consisted of (180) workers with disabilities (mental disability، auditory impairment، visual disability، hyperactivity and distraction. To achieve the goals of the study, the transformation measure was used towards digital education for people with disabilities. The study reached the following results: the availability of digital learning skills among workers with disabilities. The study concluded with a series of recommendations including holding Training courses to keep up with the challenges of educational trends and modern technology in this area.

View Publication Preview PDF
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of Internal Control Activities and their Role in Administrative Decisions
...Show More Authors

The current research aims to verify the relationship and impact of internal control activities as an independent variable in its dimensions (efficiency, training, independence) in making administrative decisions as a responsive variable and its dimensions (identifying and diagnosing the problem, searching for alternatives, evaluating alternatives, choosing the appropriate alternative, implementing the decision, following up Decision and evaluation) in the Kirkuk Water Directorate, as well as to identify the levels of their practices, and then try to come up with a number of recommendations contribute to the strengthening of internal control activities and the process of making administrative decisions of the researched Directorat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Boosting the Network Performance using Two Security Measure Scenarios for Service Provider Network
...Show More Authors

Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Agricultural Engineering
Comparing Nozzles with Different Wear Rate and Working with the Same Application Rate of Different Plant Protection Products in Aspect of Plants Condition
...Show More Authors
Abstract<p>Three different types of nozzles (different wear rate) were used in this study. They are classified depending on the severity of their wear to three groups: new, worn and damaged nozzles. Those nozzles were spraying with the same application rate (303 l/ha) on two-year field trials; this was achieved by changing the spraying pressure for each group of nozzles in order to get the same application rate. This practice is usually done by operators of sprayers, who calibrate the sprayers on the same application rate every year without changing the nozzles, so they tend to reduce the spraying pressure in order to compensate the flow rate increase due to the nozzles yearly wear. Two types of</p> ... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Study the Properties of Sodium Silicate Composite as a Barrier Separating Between the Internal Oil Distillation Towers and Chemical Fumes of Crude Oil
...Show More Authors

The study of surface hardness, wear resistance, adhesion strength, electrochemical corrosion resistance and thermal conductivity of coatings composed from sodium silicate was prepared using graphite micro-size particles and carbon nano particles as fillers respectively of concentration of (1-5%), for the purpose of covering and protecting the oil distillation towers. The results showed that the sodium silicate coating reinforced with carbon nano-powder has higher resistance to stitches, mechanical wear, adhesive and thermal conductivity than graphite/sodium silicate composite especially when the ratio 5% and 1%, the electrochemical corrosion test confirmed that the coating process of stainless steel 304 lead to increasin

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer
...Show More Authors

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref