Preferred Language
Articles
/
jcopolicy-167
Iraq's role in US security arrangements In the Greater Middle East project
...Show More Authors

إن موضوع الشرق الأوسط بشكل عام اتخذ أهمية كبيرة في الكتابات والمؤلفات التي صدرت منذ بداية النصف الأول من عقد التسعينات من القرن المنصرم مع بدايات مشاريع السلام التي أعقبت انهيار الاتحاد السوفيتي وتغير الخارطة السياسية والاقتصادية والايديولوجية للعالم .وعلى الرغم ان المصطلح ليس بجديد الا ان تعابير المصطلح وددلالاته تتغير مع تغير موازين القوى واتجاهات المصالح. إذ انتقل من مصطلح جغرافي الى سياسي وهاهو يطرح من جديد على انه مصطلح اصلاحي ذو دلالات ديمقراطية وأهداف استراتيجية بعيدة المدى. وطروحات ومسميات هي في حقيقتها أهداف يةودية وامريكية يجري تنفيذها عبر خطط ومشاريع تبدأ بمقترحات تنتهي بفرضها على ارض الواقع بشتى الوسائل حتى القوة.ومشروع الشرق الأوسط الكبير لا يختلف عن هذه الحقيقة .فبعد احتلال العراق بدأت الولايات المتحدة بطرح مشاريعها لترتيب الخارطة السياسية والاستراتيجية للمنطقة المهمة بالنسبة لها اقتصاديا واستراتيجيا وسياسيا وحتى دينيا وحضاريا, متخذة من العراق قاعدة للانطلاق والضغط على الوطن العربي والدول الاخرى التي تمثل بمجملها اطراف المشروع الامريكي القديم بولادته والجديد بطروحاته وادوات تنفيذه.وهذا ما استندنا علية في اثبات فرضيتنا التي تقوم على فكرة ان جميع الطروحات والمشاريع والترتيبات التي طرحت وما زالت تطرح للمنطقة ومسارات التغيير فيةا والذي من المفترض ان يكون نحو الديمقراطية مرتبطة تعتمد على مضامين واليات تحقيق الشرق الاوسط الكبير , والعراق له دور محوري في هذه الاجندة لان اي تغيير في العراق سيتحكم بتغيير محتمل اقليمي او عربي اخر, هذا هو المخطط الامريكي والغربي لمناطق الطاقة والثروة .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
the role of time management in facilitate the work requirements for employees of the administrative department at the ministry of higher education and scientific research
...Show More Authors

The aim of the present study is to provide the adequate knowledge about the role of time management in facilitate the work requirements for employees of the administrative department at the Ministry of Higher Education and Scientific Research. The research depend on studying four important dimensions which are (time planning, time organization, time direction and time observation). In addition to study other five dimensions which are (new procedures, clear procedures, short procedures, the available information and the simplicity of the methods

used).Questionnaire sheets consist of (38 questions) distributed to (170) employees and (146)  sheets only were considered in the study. SPSS program was used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Electronic Customer Trust Building Tools On Excellent Performance An analytical study of the opinions of a sample of individuals in the administrative and leadership positions in the Northern Cement Company
...Show More Authors

The current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question:  “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.

The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
The impact of the proposed strategy in accordance with the objectives of science in achievement and some science operations at the second-grade middle students in chemistry
...Show More Authors

It aim current researchs֬ to identify the impact of a proposed strategy in accordance with the objectives of science in the achievement and some science processes, where the experimental method was adopted, and define the research community was students second grade averag in Education Bagdad / Rusafa third, research sample intentionally chosen as school Radwan, and (30) students experimental group and (29) of control group, research tools were achievement test and the test of science operations and use the appropriate statistical tools to process information and data, showing results, the experimental group surpassed the control group in the collection and operations science, and light it, the researcher recommended several recommendat

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 09 2021
Journal Name
Nanomaterials
Investigation of Heat Transfer Enhancement in a Triple Tube Latent Heat Storage System Using Circular Fins with Inline and Staggered Arrangements
...Show More Authors

Inherent fluctuations in the availability of energy from renewables, particularly solar, remain a substantial impediment to their widespread deployment worldwide. Employing phase-change materials (PCMs) as media, saving energy for later consumption, offers a promising solution for overcoming the problem. However, the heat conductivities of most PCMs are limited, which severely limits the energy storage potential of these materials. This study suggests employing circular fins with staggered distribution to achieve improved thermal response rates of PCM in a vertical triple-tube heat exchanger involving two opposite flow streams of the heat-transfer fluid (HTF). Since heat diffusion is not the same at various portions of the PCM unit,

... Show More
View Publication Preview PDF
Scopus (42)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
An Evaluation of Environmental Performance According to The International Standard (ISO14001: 2015) in a Field East of Baghdad / A Case Study in the Midline Oil Company
...Show More Authors

EMS in accordance with ISO 14001: 2015 is considered an entry point to reduce environmental impacts, especially the effects resulting from the oil industry, which is the main source of environmental pollution and waste of natural resources, since the second revision of the standard took place in September 2015. The problem of the research was manifested in the weakness in understanding the correct guidelines that must be followed in order to obtain and maintain the standard. The purpose of this research was to give a general picture of what is behind ISO14001:2015 and how it is possible to create a comprehensive base for understanding its application by seeking the gap between the actually achieved reality, standards requirements

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 13 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role Federal Board Of Supreme Audit Of Auditing The Economic And Technical Feasibility Studies
...Show More Authors

The importance of economic and technical feasibility studies include all of the investor, the society, the banks, the project and the government. As it will assist in achieving the optimal use of the available economic incomes on the national level and arranging the projects in priority which participates in achieving the government benefit without wasting the amounts .This is the research goal So, the research covered its theoretical aspect, of SAIs and the economic and technical feasibility studies then the role of the auditors in auditing those studies Then a mechanism was proposed includes a guidebook that provides guidelines for organizing the process of preparing and auditi

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Technique Features of the 1990s Prose Poem in Iraq: The Technique Features of the 1990s Prose Poem in Iraq
...Show More Authors

Abstract:
The prose poem of the 1990s is considered one of the important
contributions of the Iraqi poetic scene. The poem found a position in the Iraqi
poetry because of the favor of a group of youth poets who lefty clear traces.
Their linguistic techniques often violate the domain o9f language, significance
and image.
The poems of those youth poets moved the verse towards reality to
drink from its abundant springs in order to stand on a rigid ground. Their
linguistic traces are characterized by paradox and astonishment that are used
by the poet to construct his poem.

The paradox was considered an ideal means for constructing a
poem by some of them. The poem moved towards definitions and these
de

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 30 2020
Journal Name
Plant Archives
Survey of the insect pests from some orchards in the middle of Iraq
...Show More Authors