Preferred Language
Articles
/
jcopolicy-551
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional leadership and the prevalence of different tensions between them and the increase in different alliances based on the centrality of the American and Chinese roles, which found resonance in the three-pronged and bilateral axis policies in the interactions of the security environment for the whole region.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Genotypes Diversity and Virulence Factor screening of Trichomonas vaginalis Isolated from Pregnant Women in Mosul (North of Iraq)
...Show More Authors

Trichomonas vaginalis is a causative agent of trichomoniasis , one of the most common non-viral sexually transmitted disease (STD) over all the world, especially in immunocompromised women such as pregnant. Wet smear and Giemsa stain are the current methods used in hospital to diagnosis trichomoniasis. DNA based diagnosis is still to be validated to diagnose the local isolates, the objective of the present study was to compare the conventional methods of disease diagnosis with the DNA-based method to diagnose Trichomonas incidence in local isolates. In the present study, 105 samples were collected from outpatient women (18-45 years) of Maternity hospital in Mosul who showed a classical presentation of Trichomonas

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Estimation & Analysis Relationship between Growth rate GDP and Unemployment Rate In Iraqi Economic in Period (1990-2014)
...Show More Authors

It reflects the gross domestic product in any country total output of goods and services by the size of the country's citizens and foreign residents during the period of the year and reflect the contribution of the commodity sectors of the economy and the distribution and service in the composition of output. And gross domestic product in Iraq as an indicator dominated in the composition of oil output, along with the contribution of the service sector, as the gross domestic product is the output of a yield lien   and subjected GDP in Iraq to a series of declines succession due to vibrations of the oil market during the economic blockade on the one hand and stop imported production inputs, lack of arriving in commodity s

... Show More
View Publication
Crossref
Publication Date
Tue Jul 04 2023
Journal Name
Qalaai Zanist Scientific Journal
The Role of The Environmental Observer and The Environmental Police in Protecting the Environment in Iraqi Law
...Show More Authors

View Publication
Crossref
Publication Date
Sat Dec 28 2024
Journal Name
Al–bahith Al–a'alami
International Public Relations (An Analytical Study of the Speeches of US President Barack Obama Addressed to the Arab Countries in Crisis)
...Show More Authors

In the midst of political, cultural and economic fast developments accelerated, the world witnessed, with the accompanied big communication revolutions, many shapes of powers. Those developments were followed by changes in relations of international level.

The most prominent among those developments was the international public relations which became equal to official international relations. Moreover, the international public relations became a complementary element dur to the growth of public opinion and its affection on political regime. Such growth of public opinion pushed the politicians to address it; and try to gain its support.

The US was the first realized the importance of international public relations. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
IRAQ BETWEEN A CULTURE OF CIVIL SOCIETY AND A CULTURE OF VIOLENCE
...Show More Authors

The title takes its realistic connotations with its symbols, slogans and historical extensions in Iraq, also, the repercussions of the organic crisis that afflicted it for almost half a century, especially after the abortion of the July 14 Revolution and the spread of the culture of weapons, violence and death that we are living in Iraq nowadays.

The topic is suitable for critical analytical studies carried out by specialists in scientific and academic research centers and cultural institutions because they have an important feasibility at the strategic cultural level in Iraq, the Middle East and the world.

Research in Iraq has fallen to the extreme and is no longer effective, to the extent that it represents a severe cri

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Historical origins of Hellenistic architecture in ancient North African civilizations: رويدة فيصل موسى النواب
...Show More Authors

Hellenistic architecture represents an important example of the reflection of ancient Greek architecture in the art of oriental architecture in the countries of the ancient world, including those states spread across North Africa that were under the authority of the Ptolemies and who were able to transmit those artistic values and traditions of Greek architecture to those regions. The current research deals with a detailed study of those important transformations of civil and religious architecture, as well as the most important features of that architecture through the constituents of location and geographical location.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Central Bank control of external transfers and its impact on the tax information system: Applied research in the General Authority for Taxes
...Show More Authors

Tax information system is one of the most important means that help the tax administration to reach the real income of the taxpayer, and the problem of research came in the General Authority for Tax ,The next question (Does the control carried out by the Central Bank on foreign remittances to reach the real income of the taxpayer). The research is gaining importance by focusing on the Central Bank's control over foreign remittances, and how to use this control to finance the tax information system. The relationship between the Central Bank's control over foreign remittances and the tax information system.The study has reached a number of recommendations, the most important of which are the following: The work of an integrated information

... Show More
View Publication Preview PDF