Preferred Language
Articles
/
jcopolicy-551
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional leadership and the prevalence of different tensions between them and the increase in different alliances based on the centrality of the American and Chinese roles, which found resonance in the three-pronged and bilateral axis policies in the interactions of the security environment for the whole region.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
Comic Scene Construction between Dramatic Situation and Acting Performance in Feature Film: علاء الدين عبد المجيد جاسم-عمار حميد حسين
...Show More Authors

The research (Comic Scene Construction between Dramatic Situation and Acting Performance in Feature Film) has been divided into the following: the methodological framework which consists of the problem of the research: how to construct the comic scene between the dramatic situation and acting performance in the feature film. The research importance and aims are: identifying how to construct the comic scene between the dramatic situation and acting performance in the feature film. The limits of the research are also stated.
The research is divided into three sections: the first is the comic situation and the Aristotelian discourse in which the comic situation is clarified starting from the Aristotelian discourse. The second section: me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Association between Allelic Variations of -174G/C Polymorphism of Interleukin-6 Gene and Chronic Kidney Disease-Mineral and Bone Disorder in Iraqi Patients
...Show More Authors

This study designed to examine association between-174G/C polymorphism of interleukin-6 gene and phosphate, calcium, vitamin D3, and parathyroid hormone levels in Iraqi patient with chronic kidney disease on maintenance hemodialysis. Seventy chronic renal failure patients (patients group) and 20 healthy subjects (control group) were genotyped for interleukin-6 polymorphism and genotyping was performed by conventional polymerase chain reaction-restriction fragment length polymorphism. No significant differences in phosphate levels were observed in patients and control with different interleukin-6 genotypes. Control had non-significant differences in calcium levels, while patients with GG and CG genotypes displayed significant e

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Achieving the rule of tax justice\Adopting the application of the international standard IFRS 15: Applied research in the General Authority for Taxes - Companies Department
...Show More Authors

Abstract:

                The research aims to achieve the basis of tax justice by making a comparison between the tax accounting process according to the application of the International Financial Reporting Standard IFRS15 and the tax accounting procedures currently used in the General Authority for Taxes to determine the annual and total tax differences, to give credibility and enhance transparency in the reports and financial statements of companies Long-term contracts when prepared in accordance with the requirements of applying the international standard IFRS15 “Revenue from Contracts with Customers”, which increases the possibility of relying on them when calculating taxes. Thus, the resea

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Al–bahith Al–a'alami
The Influence of Turkish Soap Operas in the Behavior and Trends of the Iraqi Audience (A Field Study on Iraqi University's Students)
...Show More Authors

This research seeks the effects of dubbed Turkish TV series on Iraqi audiences. The chosen sample is about 600 Iraqi students at Baghdad and al-Anbar Universities. This study consists of four sections: section one deals with the theoretical framework of the study. Section two studies the dubbed Turkish TV series. The third section explores the role of mass media in forming tendencies, and the last section seeks the field study by analyzing the tendencies if Iraqi viewers of these series.
The goal of this study is to know the role these series played in affecting the behavior and attitudes of Iraqi people and how it can change their morals.
The research ends with the number of results like the negative effect of these series on the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the causal relationship between the gross fixed capital formation and gross domestic product for the agricultural sector for the period 1980 -2010
...Show More Authors

Despite Iraq's possession of the energies material, human and agricultural resources and great economic but that contribution of the agricultural sector in the total gross fixed capital formation and gross domestic product in the Iraqi economy remained low and declining continuously since the nineties of the last century, as well as the inability of agricultural production to meet the country's needs of food . The food gap increased strategic food crops until it reached 1049 thousand tons in 2010. On this basis, there is a need to study and analysis the behavior of the function of  gross fixed capital format

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Tigris And Euphrates Rivers: Their Environment From Headwaters To Mouth
Macroplastic and Microplastic in the Freshwater Environment of Southern Iraq: Evidences Obtained from Freshwater Fish Species
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
An Evolutionary Algorithm for Task scheduling Problem in the Cloud-Fog environment
...Show More Authors
Abstract<p>The rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environme</p> ... Show More
View Publication
Scopus (15)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
The role of road elements in providing a safe environment for pedestrians
...Show More Authors

In the years recently city planning projects have been confirmed sustainable high concentration on planning streets and pedestrian paths being the most prominent component of the urban structure in the city and these me and diverse departments link the city’s sectors and serve as a space for economic, service, and social activities. On the other hand, pedestrian traffic is an essential component of the various means of transportation within the city. Suffer cities in the Middle East and Arab cities in particular are neglecting pedestrian paths in the vital urban environment. Vehicle control mechanisms on roads, and changing the uses of pedestrian paths as result of encroaching on the sidewalks designated for pedestrians. Which leads to a

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref