Preferred Language
Articles
/
jcopolicy-466
nternational will in the Security Council Towards the Syrian crisis
...Show More Authors

Nations witnessed since its existence a state of wills conflict as a result of the intersection and intertwining of interests, through which it sought to achieve its goals and objectives, and this has often led to direct military conflicts and countless wars, and witnessed the entry into global wars in which humanity lost millions of lives and losses .Despite the great changes in the international arena, especially in recent decades, the conflict of wills has not ceased, although some of its features and forms have changed, and it has become more complicated after the withdrawal of this conflict to international organizations and bodies, including the Security Council. It is mandated under the Charter of the United Nations to work for achieving international peace and security through the consensus of the permanent states and the issuance of effective resolutions to resolve the problems and issues before it, as the features of the conflict of wills between the member states in the discussions of the Syrian crisis have clearly emerged, which hindered the Council's ability to address them and caused them to continue for several years .It was reflected on more losses and even greater complexity of the situation.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 26 2018
Journal Name
Journal Of Planner And Development
التوقيع المكاني لممدينة الرياضية في البصرة وتأثيره على التنمية الاقليمية
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
السياسة النقدية في العراق بعد 9/4/2003 (الواقع والطموح)
...Show More Authors

لا يستطيع كل كائن حي أو كيان اجتماعي أداء دوره الذي يفترض أن يقوم به ما لم يمتلك الوسائل الكافية والضرورية لأداء ذلك الدور قال سبحانه وتعالى ((قال ربنا الذي أعطى كل شيء خلقه ثم هدى طه 50)).

والنشاط الاقتصادي كجزء من الكيان الكلي للمجتمع لا يختلف عن هذه القاعدة، إذ عندما يراد من النظام الاقتصادي أداء دور فاعل فلا غنى له عن الوسائل التي تمكنه من أداء دوره المنشود. للنظام الاقتصادي مجمو

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Emergency Fuel Rationing system using RFID Smart Cards
...Show More Authors

Rationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lagrange Interpolation for Mobile Agent Connection Encryption
...Show More Authors

A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.

 

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Nov 19 2020
Journal Name
Indonesian Journal Of Chemistry
Determination of Eugenol in Personal-Care Products by Dispersive Liquid-Liquid Microextraction Followed by Spectrophotometry Using <i>p</i>-Amino-<i>N,N</i>-dimethylaniline as a Derivatizing Agent
...Show More Authors

Two simple methods for the determination of eugenol were developed. The first depends on the oxidative coupling of eugenol with p-amino-N,N-dimethylaniline (PADA) in the presence of K3[Fe(CN)6]. A linear regression calibration plot for eugenol was constructed at 600 nm, within a concentration range of 0.25-2.50 μg.mL–1 and a correlation coefficient (r) value of 0.9988. The limits of detection (LOD) and quantitation (LOQ) were 0.086 and 0.284 μg.mL–1, respectively. The second method is based on the dispersive liquid-liquid microextraction of the derivatized oxidative coupling product of eugenol with PADA. Under the optimized extraction procedure, the extracted colored product was determined spectrophotometrically at 618 nm. A l

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jan 02 2020
Journal Name
Arab Science Heritage Journal
الظاهرة اللغوية بين الوص ف والتفسير أث ر المفاهي م الكل ي ة في التوفيق بين الاتجاهين العقلاني والطبيعي في دراس ة اللغ ة البشرية
...Show More Authors

This research investigates modern linguistics in terms of the “universality” concept, through which linguistics shifted its attention from the description of the phenomenon into finding an interpretation of it. Then it investigates what needs interpretation in the language

View Publication Preview PDF
Publication Date
Thu Jan 02 2020
Journal Name
Arab Science Heritage Journal
الظاهرة اللغوية بين الوص ف والتفسير أث ر المفاهي م الكل ي ة في التوفيق بين الاتجاهين العقلاني والطبيعي في دراس ة اللغ ة البشرية
...Show More Authors

This research investigates modern linguistics in terms of the “universality” concept, through which linguistics shifted its attention from the description of the phenomenon into finding an interpretation of it. Then it investigates what needs interpretation in the language

View Publication Preview PDF