Preferred Language
Articles
/
jRdEpY4BVTCNdQwCTFbj
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.

View Publication
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
الإستراتيجية: المفهوم وإشكالية المصطلح دراسة تحليلية مقارنة لأراء عينة من الأكاديميين والمديرين في المملكة الأردنية الهاشمية
...Show More Authors

المُستلخص:

      يتناول هذا البحث موضوعاً يتركز في جانب تحديد مفهوم ومحتوى الإستراتيجية. وقد أشارت الأدبيات إلى عدد من المحاولات التي هدفت إلى تلمس مفهوم ومحتوى الإستراتيجية في منظمات الأعمال، غير أن تلك المحاولات- على الرغم من ندرتها- كانت تتسم بغلبة الأطر النظرية والتعبير عن المفهوم، بالإستناد إلى حوارات فكرية وإرهاصات ذات علاقة بمفهوم ومحتوى الإستراتيجية.

&

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
معرفة
نسبة مساهمة التدفق النفسي في بعض مهارات الجمناستك الإيقاعي و فعالية رمي الثقل بالساحة و الميدان
...Show More Authors

View Publication
Publication Date
Sun Jan 13 2019
Journal Name
Arab Science Heritage Journal
دراســـة الموارد في كتاب البدر الطالع بمحاسن من بعد القرن السابع للشوكاني(ت 1250 هـ - 1834م )
...Show More Authors

تُعد دراسة أعلام الفكر العربي والإسلامي من أهم الدراسات التاريخية ولا يمكن للأمم المتحضرة أن تنسى علمائها ومفكريها لما لهم من دور كبير في حاضر الأمة ومستقبلها و تاريخنا الإسلامي يحفل بالعديد من العلماء ورجال المعرفة  الذين ساعدوا على تقدم ورقي العرب والمسلمين على الأمم الأخرى0

View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
A Posteriori L_∞ (L_2 )+L_2 (H^1 )–Error Bounds in Discontinuous Galerkin Methods For Semidiscrete Semilinear Parabolic Interface Problems
...Show More Authors

The aim of this paper is to derive a posteriori error estimates for semilinear parabolic interface problems. More specifically, optimal order a posteriori error analysis in the - norm for semidiscrete semilinear parabolic interface problems is derived by using elliptic reconstruction technique introduced by Makridakis and Nochetto in (2003). A key idea for this technique is the use of error estimators derived for elliptic interface problems to obtain parabolic estimators that are of optimal order in space and time.

View Publication Preview PDF
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Deep Learning Techniques in the Cancer-Related Medical Domain: A Transfer Deep Learning Ensemble Model for Lung Cancer Prediction
...Show More Authors

Problem: Cancer is regarded as one of the world's deadliest diseases. Machine learning and its new branch (deep learning) algorithms can facilitate the way of dealing with cancer, especially in the field of cancer prevention and detection. Traditional ways of analyzing cancer data have their limits, and cancer data is growing quickly. This makes it possible for deep learning to move forward with its powerful abilities to analyze and process cancer data. Aims: In the current study, a deep-learning medical support system for the prediction of lung cancer is presented. Methods: The study uses three different deep learning models (EfficientNetB3, ResNet50 and ResNet101) with the transfer learning concept. The three models are trained using a

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
A Green Synthesis of Iron/Copper Nanoparticles as a Catalytic of Fenton-like Reactions for Removal of Orange G Dye
...Show More Authors

This research paper studies the use of an environmentally and not expensive method to degrade Orange G dye (OG) from the aqueous solution, where the extract of ficus leaves has been used to fabricate the green bimetallic iron/copper nanoparticles (G-Fe/Cu-NPs). The fabricated G‑Fe/Cu-NPs were characterized utilizing scanning electron microscopy, BET, atomic force microscopy, energy dispersive spectroscopy, Fourier-transform infrared spectroscopy and zeta potential. The rounded and shaped as like spherical nanoparticles were found for G-Fe/Cu‑NPs with the size ranged 32-59 nm and the surface area was 4.452 m2/g. Then the resultant nanoparticles were utilized as a Fenton-like oxidation catalyst. The degradation efficiency of

... Show More
View Publication Preview PDF
Scopus (31)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Jan 15 2026
Journal Name
مجلة دراسات وبحوث التربية الرياضية
اثر بيئة افتراضية بالميتافيرس باستخدام تطبيق Home Court في تعلم بعض المهارات الاساسية بكرة السلة للطالبات
...Show More Authors

هدف البحث الى اعداد بيئة تعليمية افتراضية بالميتافيرس باستخدام تطبيق HomeCourt.والتعرف على اثر بيئة افتراضية بالميتافيرس باستخدام تطبيق HomeCourt في تعلم بعض المهارات الاساسية بكرة السلة للطالبات. استخدمت الباحثة المنهج التجريبي بالمجموعتين المتكافئتين بالاختبار القبلي والبعدي, " لأنه يعد أكثر الوسائل كفاية في الوصول إلى معرفة موثوق بها .واعتمدت الباحثة تصميم مجموعتين متساويتين مستقلتين (تجريبية وضابطة ) . اما مجت

... Show More
View Publication
Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Academic Leaders Practice at the University of Northern Border for Creative Leadership "Empirical Study"
...Show More Authors

The study aimed to identify the degree of academic leaders practices at the University of Northern Border for creative leadership, which attribute to different variables (nature of work, employer, gender, years of experience in administrative work at the university). To achieve the goal of the study, the researcher used the descriptive approach survey. Therefore, the researcher used a questionnaire as a study tool, which consisted of (40) items that included dimensions (sensitivity to problems, initiative, originality, flexibility). The study sample consisted of (240) participants included (agents of colleges, and supporting deanships, and their employees) during the second semester of the academic year 1439/1440 AH. The results showed t

... Show More
View Publication Preview PDF