Preferred Language
Articles
/
FRcu7Y4BVTCNdQwCuFpa
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the state issuing it does not take precedence over the interest of society as it is prevalent in traditional punitive laws (and the Iraqi law among them). In addition to the importance of expanding the legal diagnosis of images of indirect prejudice to social security that takes the form of media, economic and political activity, whether its source is internal or external. And presenting an integrated vision of state security that goes beyond the traditional formula in distinguishing between internal and external state security and considers the holistic character of the concept of state security in the modern era.

View Publication
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
A Blended Learning Program Based on the Next Generation Standards (NYS) to Develop the Teaching Performance of Middle School Mathematics Teachers and Some Students’ Future Thinking Skills
...Show More Authors

Abstract

The aim of the current research is to prepare an integrated learning program based on mathematics standards for the next generation of the NYS and to investigate its impact on the development of the teaching performance of middle school mathematics teachers and the future thinking skills of their students. To achieve the objectives of the research, the researcher prepared a list of mathematics standards for the next generation, which were derived from a list of standards. He also prepared a list of the teaching competencies required for middle school mathematics teachers in light of the list of standards, as well as clarified the foundations of the training program and its objectives and the mathematical

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Design and Simulation of Optical Element Use in Solid State Blue Laser Source
...Show More Authors

Solid state blue laser source is a solid state laser include generation of IR laser light 1064 nm and companied with other wavelength 810 nm that invented from other active medium (Tm:ZBLAN) and non-linear crystal (CLBO) are used to generate fourth harmonic of the resultant wavelength 1874 nm that is blue laser light of 460nm. Several optical component have been designed by multilayer dielectric structure and anti reflection coating analysis. By using MATLAB soft ware, the simulation done and used the following non linear material (ZrO2, HfO2, MgO, SiO, Ta2O5 CaF2) and other linear material (ZnO, MgF2, GaAs, AlAs, BaF2, LiF, TiO2) as coating material. The result showed that as more quarter wave layers are added to the structure, the refl

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Mon Jan 29 2024
Journal Name
Advances In Systems Analysis, Software Engineering, And High Performance Computing
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,

... Show More
View Publication
Crossref (14)
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact of the Lean Thinking on the Rationalization Costs & Achieving Customer Satisfaction: An applied Research at Ur State company Electrical Cables industries
...Show More Authors

The research explored the impact of applying lean thinking With all that carries this term of goals, trends, principles, foundations and concepts, The possibility of applying it in institutions, including Ur public company, an industrial company, And the only one in Iraq specialized in the manufacture of cables, Electrical Wires and the aluminum industry ,Which has been applied to the curriculum of lean thinking , The problem of research is that the institutions, including the company (research sample), adopt and practice traditional administrative, financial and technical methods without relying on modern curricula and ideas, including the subject of our research, In order to achieve the research objectives, the research was divided int

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Luminance pyramid for image generation and colorization
...Show More Authors

Many image processing and machine learning applications require sufficient image feature selection and representation. This can be achieved by imitating human ability to process visual information. One such ability is that human eyes are much more sensitive to changes in the intensity (luminance) than the color information. In this paper, we present how to exploit luminance information, organized in a pyramid structure, to transfer properties between two images. Two applications are presented to demonstrate the results of using luminance channel in the similarity metric of two images. These are image generation; where a target image is to be generated from a source one, and image colorization; where color information is to be browsed from o

... Show More
Scopus (2)
Scopus
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Application Tools Lean Six Sigma Definition and measurement phases in new product development. In the Electrical Industries State Company. case Study.
...Show More Authors

methodology six sigma Help  to reduce defects by solving problems effectively, and works Lean to reduce losses through the flow of the manufacturing process and when integrating these two methodologies (Lean and six sigma), the methodology of Lean six sigma will form the entrance to the organizers of the optimization process and increase the quality and reduce lead times and costs . by focusing on the needs of the customer. this process uses statistical tools and techniques to analyze and improve processes.

 We have conducted this research in the General Company for Electrical Industries and adopted its product (machine cooling water three taps) as a sample for research. In order to determine t

... Show More
View Publication Preview PDF
Crossref