Preferred Language
Articles
/
jcoeduw-1199
Popular Mobilization and human security In Local Society
...Show More Authors

The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions,  Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Authentic Leadership In Business Process Reengineering
...Show More Authors

Abstract  :

The present study aims at identifying the status of the two research variables in the organization under study and specifying the relationship and impact of the authentic leadership with all its four branch dimensions of (self-awareness, transparent relations, balanced processing of information and the moral perspective) on business process reengineering.

The basic problem of the study lies in the attempt to present a new leadership style that is more responsive to the dynamic changes surrounding it based on the authentic leadership behaviors. This is because this pattern has an impact on the nature of the organization's work and its progress.

The research

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 07 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Isolate and diagnose Mycotoxins associated with some producers of Indomie and Chips that available in local markets: Isolate and diagnose Mycotoxins associated with some producers of Indomie and Chips that available in local markets
...Show More Authors

Abstract
This study aimed to survey fungi associated with the product Indomie and Chips being the trades Iargely by a very important segment of society who are the children, beside consumed by adults, but less so, as the survey results to accompany some fungui samples sterile showed proportions presence included various fungi like. Aspergillus flavus, Aspergillus niger, Penicillium Spp., Fusarium graminearum, F.moniliforme, Alternaria alternate and Rhizopus Spp., and other fungi sterile are not diagnosed. The results showed large dominion fungi A. niger by presence sterile samples of both producers, followed by infection in Fusarium Spp., Penicillium Spp., and A. alternata by infection percentage 55, 20 and 17% respectively for the pr

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The impact of corporate governance on narrowing the expectations gap in the audit work environment (field study)
...Show More Authors

The different crises and financial collapses place in many companies, particularly in developed countries as a result of administrative and financial corruption return aspects of the task to the role of the company and the external auditor, both in their emphasis on honesty and fairness of financial statements and the Provisions of accounting information and on the contrary to the truth, you may have to the loss of the rights of stakeholders, particularly existing investors, and the loss of confidence of prospective investors in the accounting information contained in the financial statements of these companies, which led to a crisis of confidence and credibility in the profession of accounting and auditing where the wonder of ma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
The functional diversity of the directorial vision in the political theater cinema as a model
...Show More Authors

It is very necessary for the political theater to be within the space of every theatrical performance, so that the theater carries the diverse and enlightened values and cultures of this world. political theatre. In the first chapter, the researcher dealt with (the methodological framework), which includes the research problem identified by the researcher with the following question (the functional diversity of the directorial vision in the political theater)
Importance, purpose, limits and seal by defining terminology.
In the second chapter, the researcher dealt with the theoretical framework on two topics, the first (transformations of directorial vision in theatrical performance) and the second topic (aesthetic experiences i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Al–bahith Al–a'alami
The Educational Role of Children's Programs in Libyan TV An Analytical -Field Study of "Flowers of Life" Program
...Show More Authors

Television contributes children the acquisition of knowledge, moral and social values through programs that are offered to them and the extent of the focus on the effective aspects of life in the age of the target stage. The subject of this research aims to know the children programs in Libya television through a comprehensive analytical study of the program entitled “zihur al-hayat” within the broadcast season from April 1, 2004 to June 30, 2004. It also focuses on trying to identify the Libyan television policy in broadcast educational content through the children's programs in the prevailing political and social conditions during the period of study as well as knowing the opinions of the children's sample under study in Al-Baidhaa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 05 2024
Journal Name
Al-academy
Problametic of human body in post modern arts
...Show More Authors

Explanation of article events , or discribing it establish to anderstanding an phenomenon which its effects still clear in the art , surching like this may be very usful in the analysis of new art , which considering one of the most important turns in the history of art . and if we look to human body in the art as existenc in the art , from it’s begening to the modern age . so we can understand the meaning of this existence and it’s directins which cover all the worid and the lead us to thiories and suggestion’s help in understand to this direction and the effects between our arts and the external directions.

View Publication Preview PDF