Preferred Language
Articles
/
jcopolicy-498
Constructivism Theory in International Relations (Case Study on the War on Terrorism)
...Show More Authors

        The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and assumptions

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 07 2021
Journal Name
مجلة لارك للفلسفة واللسانيات والعلوم الاجتماعية
معايير النخبة الاكاديمية العراقية في التعرض للقنوات الفضائية الاخبارية الاجنبية الناطقة باللغة العربية
...Show More Authors

Publication Date
Fri Jan 21 2022
Journal Name
مجلة كلية الرافدين للعلوم الجامعة
تحليل وقياس الاستدامة المالية لصندوق التقاعد والضمان الاجتماعي في العراق للمدة 2004-2018
...Show More Authors

يعد تحليل السلاسل الزمنية من المواضـيع الهامة في تفسير الظـواهر التي تحدث خلال فترة زمنية معينة. ان الهدف من هذا لتحليل هو الحصـول على وصف وبنـاء أنموذج مناسب من اجل اعطاء صورة مستقبلية واضحة للسلاسل الزمنية المدروسة وان السلاسل الزمنية اهم الادوات المستخدمة في بناء وتقدير والتنبؤ بالظواهر المختلفة وان الاستدامة المالية هي الحالة التي تكون فيها الدولة قادرة على الوفاء بالتزاماتها الحالية والمستقبلية من غي

... Show More
Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
مجلة الدراسات المستدامة
المسؤولية المدنية الناشئة عن الاخلال بالالتزام بضمان سلامة الاشخاص في عقد التحاليل الطبية
...Show More Authors

Preview PDF
Publication Date
Sun Jan 26 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
استعمال نظام محاسبة المسؤولية في تقويم اداء مراكز الربح: بالشركة العامة للصناعات الجلدية
...Show More Authors

Use the accounting system of responsibility in assessing the performance of the company profit centers of the leather industry Given the importance of the profit centers of the General Company for Leather Industries, where a circle of activity that is accountable responsible for them (the director) about what is happening with costs and achieve revenues other words, the profit center is the beginning of an independent company with revenues and costs contribute to achieving the objectives of the company as a whole, which is to achieve profits, which means the comprehensive work of the centers of the need to evaluate its performance permanent depending on the conversion rates of the Interior. It was relied on the company's production

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Diagnosing Pilgrimage Common Diseases by Interactive Multimedia Courseware
...Show More Authors

In this study, we attempt to provide healthcare service to the pilgrims. This study describes how a multimedia courseware can be used in making the pilgrims aware of the common diseases that are present in Saudi Arabia during the pilgrimage. The multimedia courseware will also be used in providing some information about the symptoms of these diseases, and how each of them can be treated. The multimedia courseware contains a virtual representation of a hospital, some videos of actual cases of patients, and authentic learning activities intended to enhance health competencies during the pilgrimage. An examination of the courseware was conducted so as to study the manner in which the elements of the courseware are applied in real-time learn

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Al Adab
Cognitive Stylistic Analysis of Daily Yahoo Storie
...Show More Authors

Cognitive stylistics is one discipline of applied linguistics that relies on the reader’s interpretation and inference of the meaning of the text depending on his background knowledge. It studies how the reader understands the text and mapping it with his real experiences (Jeffries and McIntyre,2010). The present study is a cognitive stylistic analysis of digital stories. Digital stories are short narratives made by a combination of different sorts of digital media such as pictures, audios and videos. These digital media are employed to tell stories about oneself, famous people, and important events. The analyzed stories are selected from “Daily Yahoo Stories” and are analyzed according to Lakoff (1993) approach, The analysis investig

... Show More
Publication Date
Thu Jan 12 2023
Journal Name
مجلة السياسية والدولية /
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte

... Show More
View Publication
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Proposing a Scheme for Human Interactive Proof Test using Plasma Effect
...Show More Authors

            Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Crossref