Preferred Language
Articles
/
jcois-2172
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protect the Islamic community from this dangerous epidemic and to inject Islamic youth with the serum of the true faith to confront the disease of the age, which is atheism, by refuting atheistic suspicions and responding to them, and warning Islamic societies of their danger and alerting to the devious ways that the enemies of Islam followed it in spreading poisons and atheistic ideas, and finding out the mechanism for immunizing the individual and society from being affected by atheistic principles through the role of the media in spreading the necessary awareness to eliminate this phenomenon that is spreading in future generations, and activating the role of the teacher and educator in schools and universities to educate promising youth against this The fierce attack that wants to destroy the Islamic faith.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
Community organization and its impact on social security
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
       We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Fri Feb 10 2023
Journal Name
Dentistry Journal
The Role of Social Media in Communication and Learning at the Time of COVID-19 Lockdown—An Online Survey
...Show More Authors

This study aimed to assess orthodontic postgraduate students’ use of social media during the COVID-19 lockdown. Ninety-four postgraduate students (67 master’s students and 27 doctoral students) were enrolled in the study and asked to fill in an online questionnaire by answering questions regarding their use of social media during the COVID-19 lockdown. The frequency distributions and percentages were calculated using SPSS software. The results showed that 99% of the students used social media. The most frequently used type of social media was Facebook, 94%, followed by YouTube, 78%, and Instagram, 65%, while Twitter and Linkedin were used less, and no one used Blogger. About 63% of the students used elements of social media to l

... Show More
View Publication
Scopus (23)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Jun 15 2024
Journal Name
Obstetrics & Gynaecology Forum
THE ROLE OF FUNGAL INFECTIONS IN THE PATHOGENESIS OF DIALYSIS-DEPENDENT AND NON-DIALYSIS-DEPENDENT PATIENTS WITH KIDNEY DISEASE
...Show More Authors

Abstract The results of isolation, morphological and microscopic diagnosis, Chromic Agar, Vitik technology and Bact Alert showed that the diagnosis of fungi isolated from blood samples of end-stage renal patients who did not undergo dialysis and those who underwent dialysis was 60 samples for each type. The total number of fungal isolates isolated from people who did not undergo dialysis was 26 pathogenic fungal isolates, with a percentage frequency of 43.33%. In this study, 4 genera of pathogenic fungi were identified: Candida spp, Rhodotorula spp, Cryptococcus spp. and Aspergillus spp. The number of Candida isolates reached 13 isolates, with a frequency of 50%. The results also showed that the diagnosed species from the genus Rhodotorula

... Show More
Publication Date
Mon Jan 29 2024
Journal Name
2024 3rd International Conference On Digital Transformation And Applications (icdxa)
The Mediating Role of Cobit 2019 in Managing the Relationship Between Qualitative Characteristics of Accounting Information and Information Asymmetry
...Show More Authors

The Mediating Role of Cobit 2019 in Managing the Relationship Between Qualitative Characteristics of Accounting Information and Information Asymmetry

View Publication
Scopus Crossref
Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication
Publication Date
Fri Jun 16 2023
Journal Name
Journal Of Humanities And Social Sciences Researches
The Role and Importance of Electronic Automation in Banking Service Development: A Case Study of the Commercial Bank of Iraq
...Show More Authors

Electronic banking services appeared as a result of laying the foundations for the application of electronic automation in the banking field, and despite the clear expansion in its adoption and implementation as an inevitable necessity imposed by international and national developments, its application was not ideal according to the level that was expected to occur after the abandonment of traditional banking services, which produced some risks Which is evident in the absence of a legal system, whether at the level of proving and authoritative electronic banking services such as electronic signature, Or at the level of protecting the confidentiality of these services and ensuring that they are not exp

... Show More
Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Problematic intervention in the new international order and its impact on international relations - the U.S. role a model
...Show More Authors

Intervention in International Relations from the concepts that are still highly
controversial among those he considers a breach of international law and the UN Charter and
in violation of the rule , and those who felt that the need provided, however, that this is linked
motives humanity recognized by the international community , because the international
variables proved the inadequacy of the principle of non-interference and the principle of
sovereignty as the traditional variables international , and therefore most of the international
practice came a bus with many of the behaviors that reflect a decline in its entirety to these
principles , and became adapt these principles with international reality is too compl

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 05 2016
Journal Name
Al-academy
Formal unknown and its role in enriching the speech communication designs women's fabrics
...Show More Authors

The design fabrics of the most important episodes that are at the core process rhetorical communication, until they became these episodes ample room for research and investigation, and the issue of non-familiar formality is nothing but the result of those relationships Constructivism, which is the result of an effort builders coherent activate the shape and attributes of phenotypic, therefore it will cause him a lot of questions about his and founded the organization in order to activate the speech communication between the product(cloth)and the receiver .On this basis, the research problem identified on imposing the question follows:1. Does the non-familiar formal role in enriching communication discourse of women's fabric designs?2. Ar

... Show More
View Publication Preview PDF
Crossref