Preferred Language
Articles
/
jcopolicy-498
Constructivism Theory in International Relations (Case Study on the War on Terrorism)
...Show More Authors

        The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and assumptions

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2006
Journal Name
Journal Of The College Of Languages (jcl)
واژه هاى فارسى معرب در مقامات سيوطى ادبى طبى
...Show More Authors

همجوارى جغ ا رفياى ميان عربها واي ا رنيان نقش بز رگ در بروز آشكار برخى از روابط وعلاقه
هااى مياان دو زباان عرباى وفار اى وهمچناين مياان دو ادبيااا عرباى وفار اى وگويناد كاه ادبيااا
فار ى قديم اولين ادبياا خارجى كاه باه ادبيااا عرباى مبوا، باود وهماين باعا انبشاار زباان عرباى
در اي ا رن شد. وبعد از فبح ا لامى زبان فار ى بيشبر وا ه ژ هاى خود از زبان عربى گرفاا همچناين
به زبان عربى ب يارى از وا ه ژ هاى وادر كرد

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Political Sciences Journal
دور الحكومات في بناء الدولة ضمن اطار الدستور
...Show More Authors

دور الحكومات في بناء الدولة ضمن اطار الدستور

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
المصرية للدراسات القانونية والاقتصادية
مدى تحقق المنافسة غير المشروعة في حق المؤلف
...Show More Authors

Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Mon Dec 25 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Extraction, Identification and Isolation of B-sitosterol from Iraqi Wild Awsaj plant (Lycium barbarum) Using UAE (Probe and Bath) and two isolation technique (HPTLC and PHPLC): B-sitosterol in Iraqi Awsaj plant
...Show More Authors

Awsaj (Lycium barbarum) is a plant belong to family Solanaceae serves as a good source of bioactive compounds like phytosterols which have many important biological activity. Literature survey available so far revealed that there was no studies about Iraqi wild Awsaj phytosterols especially B-sitosterol, there for the objective of this study was to examine the efficiency of ultrasound assisted extraction (probe and bath) as compared to the conventional (Soxhlet) extraction method for extraction of phytosterols especially B-sitosterol from fruits, leaves, stems and roots of Iraqi wild Awsaj plant. This goal was achieved by comparing the extraction mass yield, also by a quick and easy approach for identification and quantification of bioac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 05 2019
Journal Name
Journal Of Planner And Development
دور وحدة الجيرة في تشكيل المجمعات السكنية المستدامة في العراق منطقة الدراسة الميدانية مجمع 28 نيسان السكني ومجمع سبع ابكار السكني
...Show More Authors

View Publication Preview PDF