The international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.
Raghad Fattah RADHI
الأحكام القانونية للجرف القاري في القانون الدولي
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreThe study was conducted in the Tigris River in Baghdad during May 2021 until March 2022 to follow the impact of climate change, rising temperatures, and the presence of pollutants on the dynamics of phytoplankton and some physicochemical variables from four sites. The results showed that the climatic conditions during different seasons, in addition to the nature of the sampling sites, have a clear and significant impact on the studied traits and, in turn, affect the phytoplankton community. The highest average temperature (30.67 ˚C) was recorded; the pH values ranged between 8.70 & 6.75; the electrical conductivity (1208.18-770.11 µS/cm ) and the total dissolved solids (TDS) (778.95- 439.49 mg/L) were evaluated. Upon measuring
... Show MoreThere are many developments in political, strategic aspects in the middle east either in
international field which represented by U.S.A as first polar in world or territorial field which
represent by Turkey and Iran, as territorial powers in the region, Turkish role is fit with
American position in order to draw new map of middle east, Turkey advocate new policy to
confirm its attitude in Euro peen Union and its relation with U.S.A.
Iran adopted policy of Expansion in Iraq, Yamen, Lebanon and Syria, in addition Iran
enlist all it efforts to develop its Nuclear program and enter Nuclear club which make Iran,
Super power in middle east and the world, each Turkey and Iran have certain attitudes toward
all political c