Preferred Language
Articles
/
abaa-199
Legal Legislation and Freedom of Expression / Historical Approach
...Show More Authors

Freedom of opinion and expression occupy the first place among the concerns of countries and international organizations. And it is also the basis of contemporary freedom because it is the foundation for achieving freedom in other fields such as politics, economics, education, etc.. The constitutions of the state have ensured that almost the entire freedom to express an opinion in all its forms either orally or writing or images of expressions, but these freedoms are identified within the law. Most countries announced their commitment to the international conventions and texts issued by international and regional organization like the Universal Declaration of Human Rights in 1948, and the International Covenant on Civil and Political Rights which have been adopted by the United Nations                                                                                  Freedom of opinion and expression occupies the first place among the concerns of countries and international organizations. And it is also the basis of contemporary freedom because it is the foundation for achieving freedom in other fields such as politics, economics, education, etc.. The constitutions of the state have ensured that almost the entire freedom to express an opinion in all its forms either orally or writing or images of expressions, but these freedoms are identified within the law. Most countries announced their commitment to the international conventions and texts issued by international and regional organization like the Universal Declaration of Human Rights in 1948, and the International Covenant on Civil and Political Rights which have been adopted by the United Nations                                                                                               The freedom of media has got a great importance because it is the most effective way in spreading the views of interests to communities, their aspirations, their rights, and to ensure them to communicate with each other. As well as it allows multiple sources through diversity in the dissemination of information. This way will help individuals ensuring that they verify the validity of the facts and make their own opinion on the events objectively. The freedom of expression has coupled with the right of access to information and its dissemination but these freedoms include duties and responsibilities. Therefore, it is forced to subdue this right for a number of legal proceedings, conditions, restrictions, specific penalties in the law as this is necessary in any democratic society in order to protect homeland and its safety, crime prevention, respect other's rights and prevent the deployment of private secrets                                                                                                                                         So, this research represents a simple effort to highlight the most important legislative aspects of some Arab constitutions that guarantee freedom of expression. And it necessitated the need to search some of the texts cited in the constitutions of Arab and foreign countries; we found how everyone agreed on freedom of expression and opinion and access to information and its circulation. Then, their freedoms have been bound with materials of the constitution to prevent the disclosure of information in many cases such as wars and crises                                                                                                                         

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Guiding Mobile Robot by Applying Fuzzy Approach on Sonar Sensors
...Show More Authors

This study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program  uses th

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Multiwavelet based-approach to detect shared congestion in computer networks
...Show More Authors

Internet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Elzaki transform decomposition approach to solve Riccati matrix differential equations
...Show More Authors

Elzaki Transform Adomian decomposition technique (ETADM), which an elegant combine, has been employed in this work to solve non-linear Riccati matrix differential equations. Solutions are presented to demonstrate the relevance of the current approach. With the use of figures, the results of the proposed strategy are displayed and evaluated. It is demonstrated that the suggested approach is effective, dependable, and simple to apply to a range of related scientific and technical problems.

Scopus (4)
Scopus
Publication Date
Tue Jan 19 2016
Journal Name
Journal Of Engineering
Assessing Close Range Photogrammetric Approach to Evaluate Pavement Surface Condition
...Show More Authors

The aim of this research is to adopt a close range photogrammetric approach to evaluate the pavement surface condition, and compare the results with visual measurements. This research is carried out on the road of Baghdad University campus in AL-Jaderiyiah for evaluating the scaling, surface texture for Portland cement concrete and rutting, surface texture for asphalt concrete pavement. Eighty five stereo images of pavement distresses were captured perpendicular to the surface using a DSLR camera. Photogrammetric process was carried out by using ERDAS IMAGINE V.8.4. The results were modeled by using a relationship between the photogrammetric and visual techniques and selected the highest coefficient of determination (R2). The first techniqu

... Show More
Publication Date
Fri Apr 01 2011
Journal Name
Al-mustansiriyah Journal Of Science
A Genetic Algorithm Based Approach For Generating Unit Maintenance Scheduling
...Show More Authors

Publication Date
Wed Oct 01 2025
Journal Name
Ieee
Securing Power Microgrids: A Cyber-Physical Approach for Modern Infrastructure
...Show More Authors

With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack

... Show More
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Materials Chemistry A
A novel approach to fabricate zeolite membranes for pervaporation processes
...Show More Authors

A method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.

View Publication
Scopus (28)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 17 2026
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Iraqi Geological Journal
Mineral Inversion Approach to Improve Ahdeb Oil Field's Mineral Classification
...Show More Authors

Knowledge of the mineralogical composition of a petroleum reservoir's formation is crucial for the petrophysical evaluation of the reservoir. The Mishrif formation, which is prevalent in the Middle East, is renowned for its mineralogical complexity. Multi-mineral inversion, which combines multiple logs and inversions for multiple minerals at once, can make it easier to figure out what minerals are in the Mishrif Formation. This method could help identify minerals better and give more information about the minerals that make up the formation. In this study, an error model is used to find a link between the measurements of the tools and the petrophysical parameters. An error minimization procedure is subsequently applied to determine

... Show More
View Publication
Scopus (7)
Scopus Crossref