Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has
The research aims to define the images of financial aid that it provides within their tasks (central banks to governments) and how it can affect the indicators of banking stability, as well as monitoring the levels of banking stability in the Iraqi economy through the indicators used by the Central Bank of Iraq, and the importance of research in banking stability lies in Iraq, because any decrease in the movement of the aggregate banking stability index will reflect negatively on the financial sector in Iraq. Therefore, the Central Bank sought to provide financial aid to the government through a group of components, some of which are represented by initiatives that contribute to revitalizing the national economy and the other hel
... Show MoreThe Arab Islamic Manuscripts in the science libraries humanly global heritage in different types of knowledge and science, as they were not confined to a particular flag but extended to include all kinds of science, and to facilitate the knowledge of these types of manuscripts has been necessary to operate them indexed in most libraries , because it is important in determining the size of those manuscripts and set them up and facilitate the work of the investigators, as well as the significance of indexing to know printed manuscripts in order to avoid repetition of the publication of the manuscript more than once, especially if the deployment is to be characterized by accurate scientific integrity and following the origins of the scienti
... Show MoreDiversity has become one of the required phenomena to be available within public organizations, in light of the changes taking place in the global and international environment and in various fields. Therefore, it was imperative to study the impact of this phenomenon in various institutions, especially public ones, in most developing countries, including Iraq. The current research aims to analyze the relationship between The demographic diversity and institutional effectiveness of a sample of workers in public institutions included (500) respondents. The questionnaires were distributed to them randomly. Diversity is considered an independent variable and institutional effectiveness a dependent variable. The researcher used interview tools a
... Show MoreThe first few years of life is the basis for proper human personality and this Made by scientific studies and research need to make all efforts to achieve the early development of children and demonstrated by the efficiency and effectiveness of great success in the educational and developmental programs that have been applied to accelerate the children's growth rate in the various their sides, the current research aims to: identify the most successful international experience in the care and upbringing of children in early childhood has been determined by current research and previous studies manners within the cognitive perspective and dealing with the subject of this research and with respect to the theoretical framework Presented rese
... Show MoreThis article presents and explores the theoretical aspect in the use of Arab Islamic theme by the western writers to obtain and achieve individual motives. In this study the model for the theory of Arab presence in Andalusia , through the book entitled “ Alhamra” by the English writer Washington Erving ,was analyzed.
The most important results in this research: the success of the author in the employment of the Islamic history in the formation of the first American legend, Columbus legend, through the selection of the right thoughts to establish his American National theory. The author compared between the Andalusia experience and the Arab occupation to Spain and the American conquest of the new
... Show More