Preferred Language
Articles
/
jcopolicy-487
Obstacles to reforming the Security Council and new international changes
...Show More Authors

The international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Reforming the insurance sector and its role in stimulation gross domestic product in Iraq for the period (2014-2018)
...Show More Authors

The main purpose of the research is to demonstrate the importance of the insurance sector in the economy through its role in providing security for all economic sectors and thus stimulating the gross domestic product and reducing dependence on the output of the oil sector, which may expose the Iraqi economy to several problems and imbalances, I have found that there is a great weakness in the role of the insurance sector in Iraq at the level of government, companies and individuals, and the reason for this is the lack of policies supporting the insurance sector and the lack of work in the strategy of economic diversity and the decrease of security awareness by individuals so became Developing the sector to ensure the urgent need

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
Geographical Changes in the Marshes of Iraq
...Show More Authors

Iraq has a range of small and large marshes, which can be divided into two groups, a group of marshes feeding water from the Tigris and Euphrates rivers, and a group of marshes fed by the seasonal valleys coming from the desert plateau and the aljazera plateau.

The marshes have go through major changes, some of them turning into industrial lakes to store the flood waters of the Tigris and Euphrates rivers. Others have been dried up and turned into agricultural land. Others have dried up and the water has been returned to them in less quantities than before.

The purpose of this research is to but light on the changes that have occurred in these marshes, with the mention of marshes turned into industrial lakes or agricultur

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Catalytic Reforming of Iraqi Naphtha over Pt-Ti / HY Zeolite Catalyst
...Show More Authors

In the present work, zeolite Y has been synthesized successfully by sol-gel method.Zeolite was synthesized by crystallization of the final gel which consist from seeding and feed stock gels at  85 oC. HY zeolite was prepared by an ion exchange process with ammonium chloride solution and then loaded with different percentages of  platinum and titanium by the wet - impregnation method.

X-ray Diffraction (XRD), X-ray Florescence (XRF), Scanning Electron Microscopy (SEM), BET surface area and, Crushing strength were used to characterize the synthesized and prepared catalysts . Results showed high crystallinity  90%  with silica to alumina ratio 5 for HY, high surface area of 600 m2/g and pore

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Improving of Design Parameters of an Industrial Continuous Catalytic Reforming Reactors
...Show More Authors

Catalytic reforming of naphtha occupies an important issue in refineries for obtaining high octane gasoline and aromatic compounds, which are the basic materials of petrochemical industries. In this study, a novel of design parameters for industrial continuous catalytic reforming reactors of naphtha is proposed to increase the aromatics and hydrogen productions. Improving a rigorous mathematical model for industrial catalytic reactors of naphtha is studied here based on industrial data applying a new kinetic and deactivation model. The optimal design variables are obtained utilizing the optimization process in order to build the model with high accuracy and such design parameters are then applied to get the best configuration of this pro

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
Structural-Semantic and Stylistic Characteristics of the New Idioms in Russian Language: Структурно-семантическая и стилистическая характеристика новых фразеологизмов русского языка
...Show More Authors

This study is dedicated to one of the most difficult topics in Russian - this is the science of idioms. A feature of the Russian speech application in recent decades has been the effective change in the lexical composition of the Russian language. This article illustrates the semantic, grammatical and stylistic structural characteristics of the linguistic units that appeared in Russian at the end of the 20th century - the beginning of the twenty-first century. This work defines these terms : terminology, linguistic unity, and terms that are used as synonyms. In this research , we will adhere to the conciliatory view of the problem and include not only the terminology in the language units, but also the terminological compositions, saying

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur

... Show More
View Publication
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis
...Show More Authors

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref