Preferred Language
Articles
/
jcopolicy-525
Security Intellectual Proposals of the Paris and the Wales Schools
...Show More Authors

The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties  of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The role of the academic institution” depending on its intellectual origins on the ideas of Renaissance and Enlightenment philosophers such as Hobbes, Locke, Rousseau and Kant, after mixing it with the critical style of the Frankfurt School. While the Paris School deals with “globalization of security”, “collection and analysis”, and “The link between internal and external security”. Its intellectual origins are based on the approaches of Michel Foucault and Pierre Bourdieu.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Evaluation the Safety and Security Procedures used In X-ray Clinics in Al-Harthiya-Baghdad
...Show More Authors
Abstract<p>Radiation is a form of energy, its emitted either in the form of particles such as α-particles and β-particles (beta particles including the electron and the positron) or waves such as sunlight, X-rays and γ-rays. Radiation found everywhere around us and it comes from many different sources naturally or man-made sources. In this study a questionnaire was distributed to people working in the field of X-rays that used for a medical imaging (X-ray and CT-scan) to evaluate the extent of awareness and knowledge in estimate the damage of ionizing radiation as a result of wrong use. The questionnaire was distributed to medical clinics in Al-Harithiya in Baghdad, which it’s considered as</p> ... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Mon Oct 13 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 12 2023
Journal Name
مجلة السياسية والدولية /
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte

... Show More
View Publication
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
Intellectual Stress of Basic Education Faculty Professors
...Show More Authors

   1-Identifying  the intellectual exertions have basic education faculty professors.

2-. Identifying the differences in intellectual exertions as a variable type (male-female) current research society is determined by the basic education college professors and both sexes Mustansiriyah University and academic year (2018-2019) and sample (200) textbook and teaching staff researcher has built a scale term This intellectual and extract his results showed statistical characteristics:-.  The College of basic education teachers suffer from stress. There were no differences between males and females in intellectual exertions.  Depending on the results, the researcher has developed a number of recommendations and

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 08 2011
Journal Name
السياسية والدولية
البرنامج النووي الايراني وانعكاساته على المعادلة الامنية لدول مجلس التعاون الخليجي
...Show More Authors

يعد موضوع البرنامج النووي الايراني من الموضوعات التي تحظى بأهمية كبيرة في مجال الدراسات الدولية بشكل عام والدراسات الاستراتيجية بشكل خاص، وذلك لكونه لا يتعلق بمستقبل الجمهورية الاسلامية الايرانية فحسب بل بمستقبل منطقة الشرق الاوسط ولاسيما منطقة الخليج العربي، وهو ذو صله وثيقة بمستقبل انتشار الاسلحة النووية بين دول المنطقة والذي قد يؤدي انتشارها الى حروب اقليمية وقد يوظف فيها هذا النوع من الاسلحة النووية،

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
Psychological alienation in relation to the motivation of achievement among incoming teachers in the schools of Dhofar Governorate
...Show More Authors

The present study aimed at identifying the level of psychological alienation and motivation of achievement among the incoming teachers in the schools of Dhofar Governorate in the Sultanate of Oman a well as to explore the correlation relationship between psychological alienation and motivation of achievement. The sample of the study consisted of (238) expatriated teachers from Al- Dhofar Governorate in Oman who were selected randomly. The psychological alienation scale and the motivation of achievement scale for teachers were used by researchers and were conducted electronically by google forms. The data were processed statistically using the Statistical Package for Social Sciences (SPSS). The results showed that the level of psy

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref