Preferred Language
Articles
/
jcois-1926
The impact of Jurisprudence Rules in Addressing Contemporary security Challenges
...Show More Authors

The impact of Jurisprudence Rules in Addressing Contemporary security Challenges

Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and preserving security.

The most important elements of the main research are the following:

  1. The legal foundations for rooting security awareness.
  2. The impact of jurisprudence rules in addressing the perpetrators and aggressors.
  3. The effect of jurisprudence rules in enhancing intellectual security.
  4. The impact of jurisprudence rules in confronting rumors threatening the security of the country.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Semantic displacement of the crucifixion of Jesus Christ in contemporary painting: عبد الحمزة عبد الأمير الكلابي، حيدر عبد الأمير رشيد الخزعلي
...Show More Authors

The search consists of four chapters, which are as follows: -First Chapter,The research shows the problem and the importance and its need, its aim and limits are to identify the terms of it consist. The problem of the research has been identified by answering the following question:How to representthe significant displacement of the Crucifixion of Jesus Christ in contemporary drawing? ,The aim of the research also has been discussed around what it represents: The significant displacement of the Crucifixion of Jesus Christ in contemporary drawingshows. As for the research limits .the portress which are taken from a variety of sources, and the period of time of the year (1945-2008).fearst chapter;The theoretical framework and previous stud

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 28 2025
Journal Name
مجلة علوم التربية الرياضية
التحديات النفسية واالجتماعية وعالقتها بالرضا الوظيفي لدى األم العاملة العراقية
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Aug 18 2019
Journal Name
Political Sciences Journal
The impact of energy's policy in the strategy of restoring the Russian global role
...Show More Authors

Abstract : This research has tackled about the role of Russia in the international policies which concerning with energy , So the most important states in the world that possesses huge energy resources to be more able in the control over the reality and future production programs and the distribution of global energy alike , the latter had effectively influence on the economic and developmental aspects within many countries in the world and its impacts on political decisions and perhaps effected too much in the dimensions of strategic policies . In this context of research , Russia has been developed a high energy policy of strategic planning in order to restoring Russia position and its global role by using its potential powerful streng

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Basrah Researches Sciences
Review article: Biodegradation of Pharmaceutical Pollutants: Challenges, Mechanisms, and Environmental Implications
...Show More Authors

The emergence of such widespread pharmaceuticals as a pollutant has become one of the world's critical environmental problems that may lead to both the public's health and biodiversity deterioration. This article provides an exhaustive account of the current understanding of the environmental persistence of pharmaceutical contaminants following in-depth analysis of the additive effects of existing natural biodegradation pathways on the human health impact of these drugs. Paying special attention to biodegradation decomposing agents such as bacteria, fungi, and algae the paper estimates their ability to convert drug ingredients to compound that is eventually less toxic. Although these biologic systems contain an enormous potential fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Effect of the Inspiring leadership to Achieve Organizational health in the Iraq Organization Field research in the Iraqi Ministry of Culture
...Show More Authors

The aim of the research is to know the characteristics of both variables in order to be able the to construct the integrated framework of its paragraphs through the available information on both inspirational leadership and organizational health. as fundamental variables of research,  as well as the extent of the influence of the inspirational variable as an independent variable in the  organizational health variable as a variable in its three  physical, mental and social dimensions. The research is important to stimulate the behavior side of the staff. Which is one of the top concerns of senior management in the ministry, because of its great importance in increasing the effectiveness of the  performance of e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (8)
Scopus Crossref
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Educational And Psychological Researches
"The Effect of Using Short stories in Enriching Students Vocabulary"
...Show More Authors

               The present study aims at answering the following questions:.

1-Which is more effective in enriching students.  Vocabulary ,the use of short stories or the      traditional way?

2-What extent has the use of short stories an effect upon the students. achievement in           vocabulary test?

3- Is there any significant difference between the male and female student of the                    experimental group in vocabulary achievement test?

 &nbsp

... Show More
View Publication Preview PDF