Preferred Language
Articles
/
jcois-1926
The impact of Jurisprudence Rules in Addressing Contemporary security Challenges
...Show More Authors

The impact of Jurisprudence Rules in Addressing Contemporary security Challenges

Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and preserving security.

The most important elements of the main research are the following:

  1. The legal foundations for rooting security awareness.
  2. The impact of jurisprudence rules in addressing the perpetrators and aggressors.
  3. The effect of jurisprudence rules in enhancing intellectual security.
  4. The impact of jurisprudence rules in confronting rumors threatening the security of the country.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 25 2022
Journal Name
Journal Of The College Of Basic Education
Semantic image coding in contemporary Theatrical performance
...Show More Authors

تعد مجالات الصورة وعلاماتها الحركية حضوراً دلالياً للاتصال العلامي واتساعاً في الرابطة الجدلية ما بين الدوال ومداليها، التي تقوم بها الرؤية الاخراجية لإنتاج دلالات اخفائية تمتلك جوهرها الانتقالي عبر الافكار بوصفها معطيات العرض، ويسعى التشفير الصوري الى بث ثنائية المعنى داخل الحقول المتعددة للعرض المسرحي، ولفهم المعنى المنبثق من هذه التشفيرات البصرية، تولدت الحاجة لبحث تشكيل هذه التشفيرات وكيفية تح

... Show More
View Publication
Publication Date
Wed Jan 07 2009
Journal Name
Political Sciences Journal
العراق في مواجهة متطلبات الانضمام الى منظمة التجارة العالمية
...Show More Authors

العراق في مواجهة متطلبات الانضمام الى منظمة التجارة العالمية

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 19 2019
Journal Name
Political Sciences Journal
Dialectical relationship between the civil state and the application of Sharia In contemporary Islamic political thought ج
...Show More Authors

The political movements of Islam are among the most prominent phenomena of the popular uprisings witnessed by the Arab world. However, this rise and the rise of some movements led to many problems on the political theses of Islam, especially those associated with the ideas of Islamic ideologues and their slogan Legitimacy and the authorities as the origin of the divine, and said the application to achieve the Islamic solution, and then became the state in theses of some Islamists a tool to apply the law and then the preservation of religion.

View Publication Preview PDF
Crossref
Publication Date
Sun May 10 2015
Journal Name
Al-academy
System formations in contemporary discourse theatrical: حارث حمزة الخفاجي
...Show More Authors

System is one of the concepts that fused stages of human thought his contemplations , and the evolution of his ideas and know the universe and existence , was formed several systems and numerous multi- humanitarian field , for example : the political system , the economic system , the system of philosophical , scientific system ... etc. .The current research around trying to find the identity of the system aesthetic in general and theater in particular , the detection of compositions and how Cklath within shifts functional and conceptual , which confirms the importance of Altgria creative as characterized by the following heading towards experimentation and update ongoing , and in particular what we find in the discourse of postmodernism

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
The contemporary role of administrative accounting Renewal or threat
...Show More Authors

The contemporary role of administrative accounting Renewal or threat

View Publication Preview PDF
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Impact of Education Program upon Nurses' Knowledge towards Children under Mechanical Ventilation at Pediatric Teaching Hospitals in Baghdad City
...Show More Authors

Objective: impact of the education program for nurses' knowledge toward children under mechanical
ventilation, and to find out the relationships between nurses' knowledge and their general information.
Methodology: Quasi experimental study was carried out at the respiratory care units of Baghdad
Pediatric Teaching Hospitals started from February15th, until September 26th, 2011, A purposive (nonprobability)
sample of (23) nurses working in the respiratory care units, were selected from Children
Welfare and Pediatric Central Teaching Hospitals. The data were gathered through using of the
constructed multiple choice questionnaire using to evaluate the nurses knowledge using checklist, The
questionnaire consists of two p

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Al-academy
Dramatic signs of place in contemporary classical shows: كاظم عمران موسى
...Show More Authors

(The sign) was born with the birth of man, after the primitive man revealed through it the forms of speech, to express his needs and instincts, and he expressed his insides through them, through the effect of his interaction and conflict with his human counterpart on the one hand and nature on the other hand, for the purpose of communicating and communicating information, as a primitive language Indicative ...., until the linguistic language replaced it and thus signs took a further development, represented by other means that were embodied by gestures, signs and movements that took common social formulas .. such as the dances that a person practiced in his social rituals and the objective and transitional movements they contained And ge

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac

... Show More
View Publication Preview PDF
Crossref