Preferred Language
Articles
/
jcois-1926
The impact of Jurisprudence Rules in Addressing Contemporary security Challenges
...Show More Authors

The impact of Jurisprudence Rules in Addressing Contemporary security Challenges

Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and preserving security.

The most important elements of the main research are the following:

  1. The legal foundations for rooting security awareness.
  2. The impact of jurisprudence rules in addressing the perpetrators and aggressors.
  3. The effect of jurisprudence rules in enhancing intellectual security.
  4. The impact of jurisprudence rules in confronting rumors threatening the security of the country.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Effect of the Inspiring leadership to Achieve Organizational health in the Iraq Organization Field research in the Iraqi Ministry of Culture
...Show More Authors

The aim of the research is to know the characteristics of both variables in order to be able the to construct the integrated framework of its paragraphs through the available information on both inspirational leadership and organizational health. as fundamental variables of research,  as well as the extent of the influence of the inspirational variable as an independent variable in the  organizational health variable as a variable in its three  physical, mental and social dimensions. The research is important to stimulate the behavior side of the staff. Which is one of the top concerns of senior management in the ministry, because of its great importance in increasing the effectiveness of the  performance of e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
The Effect of Polycystic Ovarian Syndrome on the Physical Status of Women in Reproductive Age
...Show More Authors

Objectives: To Assess the Effect of Physical Status of Polycystic Ovarian Syndrome on Women in Reproductive Age,
To Find out the Relationship Between Polycystic Ovarian Syndrome and Women's Physical Health (Acne , Hirsutism ,
Weight Gain , Irregular Menstrual Period),&To Identify the Association of Physical Status to polycystic ovarian
syndrome and Some Socio Demographic Characteristic (Age ,Occupation & Obesity ), and Reproductive
Characteristic(Gravida ,Para ,Abortion &Menstrual Regularity).
Methodology :a descriptive analytical study was conduct on Non-probability (purposive sample) of (100)women who
suffering from polycystic ovarian syndrome in reproductive age in infertility counseling from three hospit

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
EFFECT OF SIX HATS IN THE DEVELOPMENT OF LANGUAGE SKILLS OF KINDERGARTEN CHILDREN
...Show More Authors

Increasing need for day after day to find ways and innovative means of
helping to educate and give children the skills of different kind, has found a
researcher on the subject of hats, six room to give children language skills
through the experience of field reconnaissance conducted on the three
children found that language skills improved, he decided to make these study.
Objectives of the study:
Understand the differences between the experimental group first (the way the
debate) and second (six caps) depending on the test post administration.
to identify the language skills of the second group according to the pre and
post test
Differences between males and females in the second group (Six Hats)
Search T

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 31 2024
Journal Name
Basrah Researches Sciences
Review article: Biodegradation of Pharmaceutical Pollutants: Challenges, Mechanisms, and Environmental Implications
...Show More Authors

The emergence of such widespread pharmaceuticals as a pollutant has become one of the world's critical environmental problems that may lead to both the public's health and biodiversity deterioration. This article provides an exhaustive account of the current understanding of the environmental persistence of pharmaceutical contaminants following in-depth analysis of the additive effects of existing natural biodegradation pathways on the human health impact of these drugs. Paying special attention to biodegradation decomposing agents such as bacteria, fungi, and algae the paper estimates their ability to convert drug ingredients to compound that is eventually less toxic. Although these biologic systems contain an enormous potential fo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
THE IMPACT OF LISTEN TO THE VOICE OF THE CUSTOMER IN ACHIEVING COMPETITIVE SUPERIORITY
...Show More Authors

The subject of the listen to the voice of the customer of topics relatively new in management thought, as it won the attention of many organizations of different types, because it is important to achieve success and to continue and superiority to them, so there is a need to study this term in the Iraqi organizations and try to diagnose the implementation of the study sample to listen voice of the Customer and its

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The influence of Ali (may Allah be pleased with him) on interpretation: The influence of Ali (may Allah be pleased with him) on interpretation
...Show More Authors

Abstract:
Through the research, I have briefly discussed the life of Imam Ali and
indicated the interpretation of the Qur'an by language and terminology, the
importance and characteristics of Sahabas', may Allah be pleased with them,
interpretation of the Qur'an. Also, the sayings of Imam Ali, wich included the
explanatory interpretation of the Qur'an by the Qura'n, Sunnah, language, and
correct opinion. I have also indicated the reasons of the Quran's revelation
and the readings of the Qura'n that had been received from him including the
interpretive meaning these readings revealed. Finally, I concluded my
research with the most important results and recommends.

View Publication Preview PDF