Preferred Language
Articles
/
ijs-1686
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Remote Method Invocation (RMI) technique. This algorithm was compared with the most popular algorithms, such as RSA and 3DES. The results were acceptable and need to be improved in the future.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The reality of bee breeding in Iraq and ways to develop it
...Show More Authors

This study was (the reality of beekeeping in Iraq and ways of developing them) as a research project in the branch of production is important branches of the productivity of the agricultural sector in Iraq, and the importance of this section, productive (beekeeping) for the agricultural sector in his contribution to increase the vegetable production and improve the quality and the various Classes of types, through its active role in the pollination of plants and indirectly (when the bees to move between plants to collect nectar and pollen grains), which contributes to reduce the losses in plant production and raise the rate of productivity per donum of various agricultural crops.

On the other hand play a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Kurdistan Workers Party (PKK) and its Impact on Iraqi National Security
...Show More Authors

The Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar  after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
Performance evolution of a hybrid thermal solar air conditioning system and compare it with a traditional system according to Iraq weather
...Show More Authors

In a hybrid cooling solar thermal systems , a solar collector is used to convert solar energy into heat energy in order to super heat the refrigerant leaving the compressor, and this process helps in the transformation of refrigerant state from gaseous state to the liquid state in upper two-thirds of the condenser instead of the lower two-thirds such as in the traditional air-conditioning systems and this will reduce the energy needed to run the process of cooling .In this research two systems with a capacity of 2 tons each were used, a hybrid air-conditioning system with an evacuated tubes solar collector and a traditional air-conditioning system . The refrigerant of each type was R22.The comparison was in the amou

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
Iraq's role in US security arrangements In the Greater Middle East project
...Show More Authors

إن موضوع الشرق الأوسط بشكل عام اتخذ أهمية كبيرة في الكتابات والمؤلفات التي صدرت منذ بداية النصف الأول من عقد التسعينات من القرن المنصرم مع بدايات مشاريع السلام التي أعقبت انهيار الاتحاد السوفيتي وتغير الخارطة السياسية والاقتصادية والايديولوجية للعالم .وعلى الرغم ان المصطلح ليس بجديد الا ان تعابير المصطلح وددلالاته تتغير مع تغير موازين القوى واتجاهات المصالح. إذ انتقل من مصطلح جغرافي الى

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EFFECT OF USE MICROWAVE RADIATION IN SOM FOODS AND IABORATORY APPLICATIONS.: EFFECT OF USE MICROWAVE RADIATION IN SOM FOODS AND IABORATORY APPLICATIONS.
...Show More Authors

study the effect of radiation microwave (MW) in inhibition the growth of some types of bacteria in a minced meat and barker were exposed to MW for different times included (0, 10, 20, 30 and 40) sec.The results showed a high inhibition rate for 40 sec, reached to 100%. It is the other side studied the effect of microwave radiation against four types of bacteria included (Staphylococcus aureus, Escherichia coli, Proteus mirabilis and Klebsiella spp), when were exposed to for (0, 5, 10, 20, 30 and 40) sec the inhibition ratio reached to 100% in each of the Proteus mirabilis and Klebsiella spp at 30 sec and Staphylococcus aureus and Escherichia coli at 40sec. using MW in the sterilization media, such as Nutrient agar, Macconkey agar and Man

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Multi-level analysis applications in business studies
...Show More Authors

The current research aims to provide a conceptual and applied frame  on the subject of multi- level analysis in the research of business administration. The research tries to address some of the problems that befall the preparation of research and studies at the Arab level and local level, where the unity of theory and measurement and analysis, as well as clarify  the various types of conceptual constructs and give researchers the ability to  distinguish different models related to the level of analysis. On the other hand, this research  provides an example of 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Diagnosing the information technology (IT) capabilities and It’s Effect to Achieving A competitive Superiority Analytical Research in Baghdad soft drinks Company/Al- Zafaraniya
...Show More Authors

Purpose: The current research attempts to diagnosis the reflection level of Information Technology (IT) Capabilities (Architectural, infrastructure, human resources, relationships resources, and dynamic capabilities) at Baghdad soft drinks Company/Al- Zafaraniya to achieving the competitive superiority represented by indicators (Cost, quality, flexibility, delivery and innovation). Recognizing the importance of the subjects studied, and because of the importance of the expected results of the field under consideration.

Design/Methodology/Approach: The experimental method has been used, the questionnaire used to collect th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Development and innovation in the theory of singing   In the Umayyad era
...Show More Authors

The Umayyad era is characterized by the diversity of the subjects and their multiplicity in the literary phenomena. These phenomena are singing phenomena, although they were known in previous eras, they took a distinctive form in the era.
  In this light, the researcher tried to prove that singing theory in the Umayyad period was characterized by development and renewal. The research was entitled (evolution and renewal in the theory of singing in the Umayyad era).

View Publication Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication