Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their basic needs,altimitly means a decent living and freedom and the end for , and it supposed for most respect for human rights through democratic framework.
The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreThis paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show MoreThe research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
The modification of hydrophobic rock surfaces to the water-wet state via nanofluid treatment has shown promise in enhancing their geological storage capabilities and the efficiency of carbon dioxide (CO2) and hydrogen (H2) containment. Despite this, the specific influence of silica (SiO2) nanoparticles on the interactions between H2, brine, and rock within basaltic formations remains underexplored. The present study focuses on the effect of SiO2 nanoparticles on the wettability of Saudi Arabian basalt (SAB) under downhole conditions (323 K and pressures ranging from 1 to 20 MPa) by using the tilted plate technique to measure the contact angles between H2/brine and the rock surfaces. The findings reveal that the SAB's hydrophobicity intensif
... Show MoreBackground Over the past decade there has been a growing awareness of, and interest in, the trace element concentration differences between normal and diseased tissues. Significant changes in tissue concentrations of Zinc (Zn) and Copper (Cu) have been previously reported in inflammation and cancer of certain human tissues.
Aim:(1)To correlate between Zn and Cu concentrations and the histological picture of normal and certain inflamed human tissues, namely the gall bladder (GB) the vermiform appendix (VA), visceral adipose tissue (VAT) and subcutaneous adipose tissue (SAT). (2) to detect whether there is a difference in the above-mentioned parameters between VAT and SAT. (3) to obtain recordings for trace element levels in human tissu
The research problem is dedicated to investigate reservoirs irrational economic behavior adopted by the ruling elites in developing countries about the investment methodology of human capital and operating policies is based on the terms of reference of economic theory and standards governing the market, which led to a chronic structural imbalance in the workforce structure and lack of consistency with different production structure, in turn, which had a reported effects in the emergence of the phenomenon of unemployment and that they involved a certain privacy, as has become the issues of unemployment and employment in the various countries of the world are issues more important due to the presence of large numbers of the workforce in th
... Show MoreCryptosporidiosis is an intestinal protozoan parasitic disease that infects human and animals, caused by apicomplexan parasite belong to the genusof Cryptosporidium. The current study was done to record the infection rate of cryptosporidiosis in human and cattle, and genotype the clinical isolates of Cryptosporidium in Baghdad Province. A total of 265 stool sample were collected (150 from human and 115 from cattle) during the period from December 2016 to the May 2017. Cryptosporidial infection was detected using modified acid fast stain. DNA of the parasite was extracted from oocysts of positive fecal samples and nested PCR method was used for partial 60 kDa glycoprotein (gp60) gene amplification then sequence analysis for selected samples.
... Show MoreThe most important function of a prosthetic hand is their ability to perform tasks in a manner similar to a natural hand, so it is necessary to perform kinematic analysis to determine the performance and the ability of the prosthetic human finger design to work normally and smoothly when it's drive by two sets of links that embedded in its structure and pulled by a servomotor, so the Denvit-Hartenberg method was used to analyse the forward kinematics for the prosthetic finger joints to deduction the trajectory of the fingertip and the velocity of the joints was computed by using the Jacobian matrix. The prosthetic finger was modelled by the Solidwork - 2018 program and the results of kinematics were verified using MATLAB. The analys
... Show More