Preferred Language
Articles
/
jcopolicy-207
Democracy and human security
...Show More Authors

Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their basic needs,altimitly means a decent living and freedom and the end for , and it supposed for most respect for human rights through democratic framework.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Annals Of Medicine And Surgery
Association between Entamoeba histolytica infection and human leukocyte antigen HLA- DRB1
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Mobile-based Human Emotion Recognition based on Speech and Heart rate
...Show More Authors

Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to   record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
A conceptual Framework For the Relationship between Human and Social Capital
...Show More Authors

Purpose: The research seeks to develop the implications of intellectual human capital, and social capital in business organizations, and will be accomplished on three levels, the first level (the level of description) to identify, diagnose and display content philosophical Strategic Human Resource Management at the thought of modern administrative represented by human capital and Ras social capital. The second level (level of analysis) and the analysis of the extent of the impact of alignment between human capital, and social capital in the organizational strength of the organizations. The third level (Level predict) the formulation of a plan to strengthen the organizational strength in business organizations and to develop speci

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Saudi Medical Journal
Relationship between human leukocyte antigen DRB1 and psoriasis in Iraqi patients
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Apr 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Identification of Enterococcus faecalis Isolated from Infected Human Tooth Root Canals Human by Using Polymerase Chain Reaction
...Show More Authors

     One hundred samples of root canal bacteria were isolated  from patients teeth with primary and secondary infected root canal from all the ages . Biochemical and microscopial tests were done for identification of these isolates. Twenty four isolates were confirmed as       E. faecalis species by using these tests. Genetic diagnosis for the all isolates was also done by using polymerase chain reaction ( PCR ). Thirty two isolates were confirmed to  belong to E. faecalis species by using this test.

View Publication Preview PDF
Publication Date
Tue May 09 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
TIME MANAGEMENT AND WORK PRESSURE AND THEIR RELATIONSHIP TO ADMINISTRATIVE LEADERSHIP/ A CASE STUDY AT THE HIGHER INSTITUTE FOR ADMINISTRATIVE DEVELOPMENT OF SECURITY AND ADMINISRATIVE: TIME MANAGEMENT AND WORK PRESSURE AND THEIR RELATIONSHIP TO ADMINISTRATIVE LEADERSHIP/ A CASE STUDY AT THE HIGHER INSTITUTE FOR ADMINISTRATIVE DEVELOPMENT OF SECURITY AND ADMINISRATIVE
...Show More Authors

The research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of th

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Improving the efficiency and security of passport control processes at airports by using the R-CNN object detection model
...Show More Authors

The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
Alternative Sanctions and their Impact on Societal Security: A Field Study in the Directorate of Juveniles Reformatory in Baghdad
...Show More Authors

Crime is one of the most severe challenges facing States, and strives to find preventive measures, reduce its seriousness, and prevent them; due to developments, crimes have increased, and emerging new patterns of crimes, there is an urgent need to prevent crimes and reduce their effects. Modernizing its punitive system and diverting it to correctional rehabilitative justice to redress the prejudice caused by the crime and rehabilitate the convicted person by using alternative measures to short-term imprisonment. This research emphasizes alternative sanctions' value to minimizing short-term imprisonment penalties and their impact on societal security through several goals like, the negative consequences, justifications, and alternatives

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
A study of the safety and security conditions followed in the X-ray clinics in the Al-Amiriya-Baghdad
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.