Preferred Language
Articles
/
jcopolicy-498
Constructivism Theory in International Relations (Case Study on the War on Terrorism)
...Show More Authors

        The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and assumptions

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Bat Algorithm Based an Adaptive PID Controller Design for Buck Converter Model
...Show More Authors

The aim of this paper is to design a PID controller based on an on-line tuning bat optimization algorithm for the step-down DC/DC buck converter system which is used in the battery operation of the mobile applications. In this paper, the bat optimization algorithm has been utilized to obtain the optimal parameters of the PID controller as a simple and fast on-line tuning technique to get the best control action for the system. The simulation results using (Matlab Package) show the robustness and the effectiveness of the proposed control system in terms of obtaining a suitable voltage control action as a smooth and unsaturated state of the buck converter input voltage of ( ) volt that will stabilize the buck converter sys

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 26 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
USE OF ESSENTIAL OIL FOR NIGELLA (Nigella sativa) AND SPEARMINT (Menthaspicata) TO PROLONG SHELF LIFE DURATION OF SOFT WHITE CHEESE: USE OF ESSENTIAL OIL FOR NIGELLA (Nigella sativa) AND SPEARMINT (Menthaspicata) TO PROLONG SHELF LIFE DURATION OF SOFT WHITE CHEESE
...Show More Authors

The effects of essential oilNigella sativa and Menthawas study on the chemical, microbial and sensory properties for soft white cheese that produced from it during storage at 0, 7 and 14 days .The results show significantly percent decrease in moisture for all samplesand maximum decrease was at the latest storage period for all them .The reduced in moisture was accompanied with increase in percentage of protein and fat during of storage period for all samples.
The control sample showed increased in bacterial logarithmic for total count bacterial, coliform, Staphylococcus aureus, proteolytic bacteria, lipolytic bacteria and mold and yeasts during of storage period , the highest results showed at the latest storage period 14days, it w

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
An Artificial Intelligence-based Proactive Network Forensic Framework
...Show More Authors

     is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
مجلة نسق
واقع التمكين الاداري في كلية التربية للعلوم الصرفة - ابن الهيثم من وجهة نظر موظفيها
...Show More Authors

Publication Date
Tue Sep 13 2022
Journal Name
جامعة بغداد/ كلية التربية للعلوم الصرفة - ابن الهيثم
اثر انموذج تسريع التعلم في تحصيل مادة الرياضياتوالتفكير المحوري لدى طالبات الصف الثالث المتوسط
...Show More Authors

Publication Date
Tue Jan 01 2019
Journal Name
مجلة مداد الاداب
معوقات تطبيق تكنولوجيا المعلومات والاتصالات في كليات جامعة بغداد من وجهة نظر العمداء والمعاونيين
...Show More Authors

هدف البحث التعرف على المعوقات التي تحول دون تطبيق تكنولوجيا المعلومات والاتصالات في كليات جامعة بغداد بأعتبار أن ذلك يمثل مشكلة لابد من الوقوف عندها , ولأهمية مثل هذه المواضيع وضرورة البحث عنها , إذ تحدد مجتمع البحث بالعمداء والمعاونيين في هذه كليات جامعة بغداد للعام الدراسي 2016-2017حيث قام الباحث ببناء اداة خاصة للبحث لغرض الاجابة على هدف البحث الرئيسي ومن خلال أجابات أفراد عينة البحث التي مثلت ما نسبته66% الى ا

... Show More
Publication Date
Thu Jul 02 2015
Journal Name
الاستاذ
النقد القصصي في منجزات الدكتور نجم عبد الله كاظم (القصة القصيرة والقصيرة جدًا أنموذجًا)
...Show More Authors