Preferred Language
Articles
/
jcois-1926
The impact of Jurisprudence Rules in Addressing Contemporary security Challenges
...Show More Authors

The impact of Jurisprudence Rules in Addressing Contemporary security Challenges

Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and preserving security.

The most important elements of the main research are the following:

  1. The legal foundations for rooting security awareness.
  2. The impact of jurisprudence rules in addressing the perpetrators and aggressors.
  3. The effect of jurisprudence rules in enhancing intellectual security.
  4. The impact of jurisprudence rules in confronting rumors threatening the security of the country.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
Achieving an Iraqi model in contemporary fashion design
...Show More Authors

The Iraqi outfit is characterized by special features and identity that are closely related to the traditions, customs, religious and social beliefs and other references of the Iraqi environment and its factors affecting the individual and society. Every place in Iraq has its own uniform, which differs in terms of its artistic, aesthetic and functional components from place to place.

The abaya, especially worn by women, is especially distinct in terms of the design of the uniform, the nature of the cloth made of it, as well as the color of the abaya, which is dominated by black in most designs. The Dar Al-Taros Center and Textile Research initiated the construction of theoretical and practical bases in the design of contemporary

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 08 2024
Journal Name
Engineering, Technology & Applied Science Research
Applying the Analytical Hierarchy Process to Identify the Challenges and Priorities of Reconstruction Projects in Iraq
...Show More Authors

Reconstruction project management in the cities of Mosul, Anbar, and Tikrit, in Iraq still faces major obstacles that impede the comprehensive performance of these projects. It is thus necessary to improve the arising challenge estimation in the implementation of reconstruction projects and evaluate their components: time, cost, quality, and scope. This study used the Analytical Hierarchy Process (AHP) to prioritize major and minor criteria in the influential causes of challenges and formulate a mathematical model to help decision-makers estimate them. Using the Super Decisions software, the final results indicated that changes in scope reached 40.8%, which is the greatest difficulty, followed by changes in cost at 27.6%, changes in

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Smart grid in the context of industry 4.0: an overview of communications technologies and challenges
...Show More Authors

The recent advances in technology, the increased dependence on electrical energy and the emergence of the fourth industrial revolution (Industry 4.0) were all factors in the increased need for smart, efficient and reliable energy systems. This introduced the concept of the Smart Grid (SG). A SG is a potential replacement for older power grids, capable of adapting and distributing energy based on demand. SG systems are complex. They combine various components and have high requirements for real time reliable operation. This paper attempts to provide an overview of SG systems, by outlining SG architecture and various components. It also introduces communication technologies, integration and network management tools that are involved in SG sys

... Show More
View Publication
Scopus (43)
Crossref (19)
Scopus Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
The effectiveness of media communication and its problems in the contemporary theatrical presentation
...Show More Authors

View Publication
Crossref
Publication Date
Thu Feb 13 2025
Journal Name
Technology In Agronomy
Challenges and innovations in potato harvester design: the role of artificial intelligence in improving crop sorting
...Show More Authors

As population growth increases the demand for crops increases and their quality improves, and it becomes necessary to find innovative and modern solutions to enhance production. In this context, artificial intelligence plays a pivotal role in developing new technologies to improve crop sorting and increase agricultural yields. The present review discusses the main differences between manual and mechanical potato harvesting, explaining the advantages and disadvantages of each method. Manual harvesting is highlighted as a traditional method that allows for greater precision in handling the crop, but it requires more time and effort. In contrast, mechanical harvesting provides greater efficiency and speed in the process, but it may damage some

... Show More
View Publication
Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Phenomenology as an approach to seeing the aesthetics of ugliness in contemporary art designs
...Show More Authors

With a descriptive and analytical approach, it discusses the concept of phenomenology as an approach to seeing the aesthetics of ugliness as one of the concepts associated with the aesthetic experience in contemporary art designs, as it is the result of communication between artistic production and the recipient, which leads to creating a state of aesthetic pleasure. A phenomenological method is used to uncover the aesthetics of ugly and to connect ugliness and beauty since ugliness in aesthetics incorporates beauty as a modern aesthetic vision from the phenomenological perspective. The study investigated aesthetics as a phenomenon of perception, sensory knowledge, and the aesthetic response to the production of designs in contemporary a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 14 2022
Journal Name
Al-academy
The genealogy of rough discourse in contemporary theatre (YES, GODOT play) as a model
...Show More Authors

The research is exposed to the concept of rough discourse in contemporary theater with a critical reading that takes the genealogical work as a starting point in deconstructing the references of rough discourse and pursuing its paths in the civilization and cultural framework and how it identifies aesthetically within the theatrical field and the extents of its procedural treatments in order to reveal it and clarify its limits and representations, as the research included the first chapter. (methodological framework), the second chapter (theoretical framework), which included two sections, the first took place under the title (rough dramatization), while the second topic took place under the title (rough drama), and the second chapter re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref