يهدف البحث الى صياغة استراتيجية اعلامية لمواجهة اعلام التنظيمات الارهابية
The research is a vision of the future of industry in Iraq, so it is may be outside the ceiling of the capabilities of the Iraqi economy, and therefore it is exaggerated. Therefore, future plans must be applicable through the availability of capabilities. Everyone knows that the financial and administrative corruption and mismanagement of resources are the main cause of the inefficiency of the industrial sector, and the failure to exercise its real role in achieving economic development.; as well as the political situation and the dominance of parties and their insistence on addressing positions that have a strong relationship in managing the economic sector that has a significant impact on drawing the economic map in its current
... Show MoreIn the field of research in the investment of gas fields, this requires that we first look at the center of the contracting parties in terms of the guarantee means granted to them under the contract, which constitute a means of safety and motivation to enter as major parties in the investment project. In turn, we will discuss the minimum guarantees, which are the most important guarantees granted to each of the two parties to the contract, namely the national party and the investor.
This research aims to investigate the extent to which the Iraqi audience relies on interactive television programs as a source of information regarding national issues and their resulting impacts. It seeks to identify the types and nature of attitudes developed among the public towards national issues through these programs and determine the prominent topics and issues highlighted to the audience. The researcher employed a field survey as the primary research method, employing a questionnaire for data collection along with scientific observation and the Likert three-point scale to measure attitudes. The study was guided by the media dependency theory. A sample of 520 questionnaires was distributed to residents in
... Show MoreWith the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.
This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos
... Show Moreتم التوقيع على معاهدة غرناطة في 25 نوفمبر 1491 ، ومنحت فيها غرناطة جميع الحقوق الدينية والاجتماعية والاقتصادية ، ولكن على الأرض لم تكن سوى ورقة وخدعة ، والغرض منها استسلام المدينة في أقصر وقت. وبأقل التكاليف. وقد تعرض الأندلسيون للاضطهاد في جميع مناحي الحياة حتى جاء قرار طردهم جاء من البلاد.
Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.
Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad
... Show Moreعلى الرغم من التقدم العلمي والتكنولوجي للمعلومات فما زالت الذاكرة تقوم بالدور الاساس بغض النظر عن الامكانيات العلمية في العصر الحديث من حيث ان الكثير من مفرادات الثقافة الانسانية ينقل من جيل الى اخر بواستطتها, ومن الصعب تصور حياة نفسية مقصورة على الحافز فقط, اننا لو اقتصرنا على الحافز لكان التفكير غير ممكن لان الذاكرة هي التي تصل الحافز بالماضي وابسط صورها هي الذاكرة الاولية . فلولا الذاكرة لما تكونت ال
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur
... Show More