Preferred Language
Articles
/
jcopolicy-466
nternational will in the Security Council Towards the Syrian crisis
...Show More Authors

Nations witnessed since its existence a state of wills conflict as a result of the intersection and intertwining of interests, through which it sought to achieve its goals and objectives, and this has often led to direct military conflicts and countless wars, and witnessed the entry into global wars in which humanity lost millions of lives and losses .Despite the great changes in the international arena, especially in recent decades, the conflict of wills has not ceased, although some of its features and forms have changed, and it has become more complicated after the withdrawal of this conflict to international organizations and bodies, including the Security Council. It is mandated under the Charter of the United Nations to work for achieving international peace and security through the consensus of the permanent states and the issuance of effective resolutions to resolve the problems and issues before it, as the features of the conflict of wills between the member states in the discussions of the Syrian crisis have clearly emerged, which hindered the Council's ability to address them and caused them to continue for several years .It was reflected on more losses and even greater complexity of the situation.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Sun Dec 01 2019
Journal Name
Scientific Journal Of Silesian University Of Technology. Series Transport
THE IMPACT OF SHIFTING TOWARDS ECO-FRIENDLY TRANSPORTATION AT THE UNIVERSITY OF BAGHDAD, AL-JADRIYA CAMPUS (UBAC)
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Adopting the Crowdsourcing in Activation Strategic Foresight for Leaderships Towards Managerial Reforming Strategies Selection A Suggested Study for Managerial Leadership
...Show More Authors

Abstract                                                                                                            

Environmental data (whether pre-emptive or responsive perspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The level of Trends banking leaders towards organizational confidence and its and reflection on the dimensions of the strategic position: An applied research in Egypt in Al-mansour Investment and the Business Bay
...Show More Authors

The aim of this research is to show the level of banking leadership trends in the importance of  organizational  confidence and its reflection in the dimensions of the strategic position the research was applied in a bank (Al- Mansour Investment, Business Bay), and the Questionnaire Was adopted as a tool to collect data and information from the number of the sample (15) who are in allocation (Department Manager, Department Manager Department Manager, Division Officer, Unit Officer) and he used the statistical program (spss) to calculate (standard deviation, arithmetic mean, percentages, regression, analysis,F-test coefficient of determination R2, Coefficieent, square Kay and the research reached a number of conclusions, the mos

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of risk management programs in Dealing With risks at international airports: An Applied research at Baghdad International Airport
...Show More Authors

The objective of the research is to identify the efficiency of risk management in various names at Baghdad International Airport in the face of various risks (financial - technical - human - natural ..) facing the sample of the search of the General Establishment of Civil Aviation and the Iraqi Airways Company where the researcher identified the hypothesis that summarizes There is a significant significant correlation between risk management, risk management and risk review and assessment. The researcher used the means of research from observation and interviews with the relevant officials in this field, as well as used the questionnaire and distributed a sample of 170 employees in the field of risk management (SMS Department) in Iraqi A

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Using the international standard for Training (ISO-10015) to Improve the Quality of the Control Activity – A Survey Study at the Federal Board of Supreme Audit.
...Show More Authors

The great  importance of training made it as an investment for the organization, and assert the Quality of performance which support it by prepare the employee to the Current and future Jobs . The Research problem a rounded about How to measure the impact of training based on (ISO 10015) and its effect on the Quality of performance , How to evaluation the results of training to attained the training goals . The Research aims to find out the effects of application of international standard guidelines (ISO 10015) to attained the quality of audit work achieved in the Federal Board of Supreme Audit. The Research sought to achieve a number of objectives cognitive and applied on the basis of four key assumptions, and other su

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Business incubators the entrance of organizations to shift towards pioneering performance a study by a number of employees of the technical education organizations in mosul
...Show More Authors

     The importance of this research is due to its importance goals, Which are about the attempt of researchers to investigate the probability of depending on businesses, environments to transform organizations, performance in away that enhance the leading  role of organizations  in their environments , and through views of a number of the staff working in the foundation of technical institutes in Mosul.  .

     After deciding the methodology of the study that ,in one hand ,performs the goals of the study , and achieving a suitable theoretical framework to present the concepts of businesses, environments and the leadin

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Global Pharma Technology
Evalution of the effect of Gigaspora margarita and Glomus desriticola fungi in stimulating the resistance of the capsicum annuum L. plant towards chromium and lead
...Show More Authors

The present study was conducted to evaluate the effect of fungi Gigaspora margarita and Glomus desriticola in stimulating the resistance of the capsicum annuum L. towards the chromium and lead after 60 days, planting and using the pots in the glass house. The highest concentration of chromium and lead in the root was found in the presence of the mycorrhizal mixture (194.93, 150.40) μg / g, respectively, compared to the lowest concentration (90.69, 79.37) μg / g respectively, while the highest concentration of chromium and lead in the shoot was found in the presence of the mycorrhizal mixture (94.63, 79.33) μg / g respectively, compared with the lowest concentration in the control treatment (72.58, 60.70) μg / g respectively. The results

... Show More
Scopus (2)
Scopus