Preferred Language
Articles
/
jcois-1926
The impact of Jurisprudence Rules in Addressing Contemporary security Challenges
...Show More Authors

The impact of Jurisprudence Rules in Addressing Contemporary security Challenges

Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and preserving security.

The most important elements of the main research are the following:

  1. The legal foundations for rooting security awareness.
  2. The impact of jurisprudence rules in addressing the perpetrators and aggressors.
  3. The effect of jurisprudence rules in enhancing intellectual security.
  4. The impact of jurisprudence rules in confronting rumors threatening the security of the country.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
Employment aesthetic to the sitting position in contemporary Iraqi Sculpture: سلام محمد سعيد هاشم
...Show More Authors

This paper deals with aesthetic and a sitting position in contemporary Iraqi sculpture and studied this situation, an analytical study to reveal how to employ them in aesthetically pleasing work of art has been research in a sitting position to a lack of technical library for such research, this study includes four chaptersChapter I contains the research problem and its importance in terms of the released address and its objectives in the detection of this situation, how to employ the HDL research is to detect how the aesthetic of the Employment sit position and limits Find business is bronze and stone-dimensional exclusively carried out from 2000 to 2009 AD.Chapter II included the Framework theory and previous studies and with three Inv

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Aug 12 2017
Journal Name
Journal Of Engineering
Prepare rules spatial data for soils and the Calculation of an Area in Iraq for Industrial Purposes using Geographic Information Systems (GIS)
...Show More Authors

 
      The process of soil classification in Iraq for industrial purposes is important topics that need to be extensive and specialized studies. In order for the advancement of reality service and industrial in our dear country, that a lot of scientific research touched upon the soil classification in the agricultural, commercial and other fields. No source and research can be found that touched upon the classification of land for industrial purposes directly. In this research specialized programs have been used such as geographic information system software The geographical information system permits the study of local distribution of phenomena, activities and the aims that can be determined in the loca

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
SMS Spam Detection Based on Fuzzy Rules and Binary Particle Swarm Optimization
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Sat Mar 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of applying the CAMELS banking assessment model asa control tool On Iraqi private commercial banks for the period 2016 -2020
...Show More Authors

The banking sector is currently facing great challenges resulting from intense competition in the financial environment, and this is what makes the supreme audit bodies and the Central Bank audit as the highest supervisory authority on banks in order to achieve profit and not be exposed to loss, and this requires identifying the banking strengths and risks that constitute points Weakness that affects the future performance and the life of the bank, which requires special supervisory care, and from this point of view, the research aims to use the CAMELS model as a control tool in banks, through the use of its six indicators: capital adequacy, asset quality, management quality, profits, liquidity And sensitivity to market risks, th

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Al-academy
Impact organization of configuration for still life in paintings of first grade students for department of Art Education in subject of colors: احمد مطشر لطيف السبتي
...Show More Authors

Problem of research as defined, including the following:what is impact organizing of configuration for still life in paintings of students in the Department of Art Education in subject of colors ?Study of well training for organized in painting of still life is necessary for a teacher of art education to contribute effectively to the performance of his letter, so is this research in response to the public goals for a subject of art education. The current research aims to:1. Impact organization of configuration for still life in paintings of students in the Department of Art Education for the first grade in subject of colors2. Role organization of configuration for still life in the painting to serve the educational process in subject of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Alienation in Contemporary Sculpture between the Works of Anthony Caro and Tony Cragg (A Comparative Study)
...Show More Authors
  • The subject of this research is the study of the formal alienation of contemporary English sculpture, by comparing the most important sculptors of the new contemporary generation. This research problem is to look for the important factors in the formation of the contemporary sculptural structure of the exotic, and what is the mechanism of formation and output of these forms. The research seeks to explore (Alienation in contemporary sculpture between the works of Anthony Caro and Tony Cragg) in a comparative study. The importance of the research is to identify the concept of alien forms in contemporary British sculpture, especially in the cases of Anthony Caro and Tony Cragg that this research is considered a know

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
Research on the book observatories walls in doctrinal issues Written by Imam Sana Allah bin Ali bin Khalil (1137 AH)
...Show More Authors

The topic of the research on the Observatory of the Walls on Jurisprudential Matters in the Hanafi Fiqh, by Imam San’a Allah bin Ali bin Khalil Al-Ala’iyya Wai al-Naqshbandi, al-Rumi, who died in 1137 AH, which includes seven chapters, the first section of it concerning division and related matters, and the second section in the adaptation It is the apportionment of benefits in common objects, the third section, which pertains to lines, surfaces, and bodies, the fourth section, which concerns the inclined wall and certification, and the fifth section, which concerns the provisions of the walls and its claims, and the sixth section, which concerns the door of roads and doors, the opening of the skylight, the sails of the wing, the can

... Show More
View Publication Preview PDF