Preferred Language
Articles
/
jcopolicy-498
Constructivism Theory in International Relations (Case Study on the War on Terrorism)
...Show More Authors

        The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and assumptions

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 03 2010
Journal Name
Journal Of Educational And Psychological Researches
اثر برنامج إرشادي في تنمية بعض المفاهيم التربوية المستنبطة من بعض المواقف اليومية التي يعيشها طفل الروضة
...Show More Authors

It has became necessary helping the children to developing same of educational values which can be drawn from daily situations which the live. Especially the childhood stage is the basic building of value individual content since its establishment the societies take care of learning children and take care of them. Through their institutes which depended on, in this function. Therefore the importance of this, research is coming from the importance of this age stage and from importance and necessity of children aguirement the educational values and its development to them, and  the importance this research  coming from depending on guidance program with  new content and it is (al bum of pictures) fro

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 08 2022
Journal Name
مجلة الجامعة العراقية
أولويات ترتيب امتلاك المها ا رت الاتصالية عند المحررين الصحفيين د ا رسة مسحية في جريدة الزمان
...Show More Authors

تبحث هذه الدراسة في المهارات االتصالية عند المحررين الصحفيين وترتيب أولويات امتالكها لديهم إذ تلعب المهارات االتصالية دورا مهما في نجاح عملية التحرير الصحفي للرسالة بكل أنواعها سواء كانت خبرا أو مقاال أو تقريرا أو تحقيقا أو حديثا ، وتتنوع هذه المهارات بين األساسية المتعلقة باالتصال والمالحظة القوية وسرعة التعبير وبين المكملة لها المتعلقة باللغة والمعنى واإلرسال واالستقبال ، وتأتي هذه الد ارسة لتركز الضوء

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
المجلة العلمية لكلية التربية الرياضية للبنين بالهرم جامعة حلوان
تأثير تمرينات مركبة باستخدام السلالم الارضية في تطوير بعض القدرات التوافقية والبدنية والمهارية للاعبي كرة القدم للصالات
...Show More Authors

Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Scientific Research Journal Of Engineering And Computer Science
Cryptography Techniques - A Review
...Show More Authors

l

Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
FREE VIBRATION ANALYSIS OF COMPOSITE LAMINATED PLATES USING HOST 12
...Show More Authors

This paper presents an application of a Higher Order Shear Deformation Theory (HOST 12) to problem
of free vibration of simply supported symmetric and antisymmetric angle-ply composite laminated plates.
The theoretical model HOST12 presented incorporates laminate deformations which account for the effects
of transverse shear deformation, transverse normal strain/stress and a nonlinear variation of in-plane
displacements with respect to the thickness coordinate – thus modeling the warping of transverse crosssections more accurately and eliminating the need for shear correction coefficients. Solutions are obtained in
closed-form using Navier’s technique by solving the eigenvalue equation. Plates with varying number of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Engineering
Architecture Between Mind and Empirical Experience
...Show More Authors

The research aims to identify the level of balance in the architectural thought influenced by the rational type human consciousness, the materialistic based on the Empirical type, moral based on human experience as source of knowledge.

This was reflected in architecture in the specialized thought that the mind is the source of knowledge which explains the phenomena of life. The rational approach based on objectivity and methodology in (Form Production), the other approach is based on subjectivity in form production (Form Inspiration).

The research problem is that there is imbalance in the relationship between the rational side and the human experience in architecture, which led into imbalance between theo

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Approximate Solution for Fuzzy Differential Algebraic Equations of Fractional Order Using Adomian Decomposition Method
...Show More Authors

      In this paper we shall prepare an  sacrificial solution for fuzzy differential algebraic equations of fractional order (FFDAEs) based on the Adomian decomposition method (ADM) which is proposed to solve (FFDAEs) . The blurriness will appear in the boundary conditions, to be fuzzy numbers. The solution of the proposed pattern of  equations is studied in the form of a convergent series with readily computable components. Several examples are resolved as  clarifications, the numerical outcomes are obvious that the followed approach is simple to perform and precise when utilized to (FFDAEs).

View Publication Preview PDF