Preferred Language
Articles
/
jcopolicy-110
National security and human security concepts in the study
...Show More Authors

Security reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective, which limited understanding of specific dimensions, to the renaissance of this field during the Cold War era, And the emergence of a new environment with new interactions whose demands, structures and needs differ from past periods, to produce new concepts that adapt and respond to this environment. One of the most prominent of these adaptations was the shift in levels of interest in security studies from the states To individuals and to meet the needs of this environment and its data, including the emergence of the concept of human security, which was consistent in his movement with the concept of national security

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Administrative decision-making strategies Concepts - theories factors affecting
...Show More Authors

Objective: To know the recent shifts in the decision-making process and theories and stages, techniques and systems affecting it.
      The need for research coming  because of the problems that accompany the decision as a result of the failure Sometimes, poor visualization or the narrow perspective of decision-making than miss the opportunity to choose alternatives or options of the most effective and appropriate to solve a problem.
      And has received exceptional decision-making process in administrative studies and research to enable the organization to continue its activities and its high efficiency, especially successful that the decision depends on the future,

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The effect of constructivist model of yager in acquiring the geographical concepts among first intermediate students in geography
...Show More Authors

The purpose of the study is to investigate the effect of the constructivist model of yager in acquiring the geographical concepts among first intermediate students in geography. The study was carried on based on the null hypothesis, which states, there is no significant difference at the level of (0.05) between the experimental group that follows yager model in learning the principles of geography, and the control group that studies the same subject considering the traditional methods of learning, the. To do so, a sample of (70) first-intermediate student were chosen purposefully from two random class for the academic year (2016-2017) divided into two groups. The selected schools located at Al-rusafa side in the city of Baghdad, as well

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Human capital and its role in achieving the underwriting policy: Applied research in the National Insurance Company
...Show More Authors

The insurance companies are one of the organizations that rely mainly on human capital to underwriting to insurable risks because most of risks have many variables, so the aim of the research is to show the level of interest of the researched company in human capital, the reality of the underwriting policy in it, and the relationships of correlation and effect between them, and the approach has been used Analytical descriptive, as books, research and other related sources were used for the purpose of completing the theoretical side, on the practical side, a questionnaire was prepared, which represents the main tool for collecting data and distributed to a random sample of 64 people from underwriting managers and employees in spec

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 27 2020
Journal Name
Journal Of The College Of Education For Women
The Effectiveness of PDEODE Strategy in Acquiring Historical Concepts in the Subject of History for Students of the Fourth Literary Grade
...Show More Authors

The research aims to know (the effect of the pdeode strategy) in acquiring historical concepts among the fourth-grade literary female students in the history module. To achieve the goal of this research, the following null hypothesis was formulated. There is no statistically significant difference at the level of (0.05) between the average scores of the experimental group students, who study history according to the PDEODE strategy, and the average scores of the control group students who study the same module in the traditional way of the historical concepts acquisition test.The researcher chose the experimental method for the current research and adopted the experimental design of partial control with a post-test, which depends on the

... Show More
View Publication Preview PDF
Crossref