Preferred Language
Articles
/
jcopolicy-551
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional leadership and the prevalence of different tensions between them and the increase in different alliances based on the centrality of the American and Chinese roles, which found resonance in the three-pronged and bilateral axis policies in the interactions of the security environment for the whole region.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Asian Multicultural Research For Social Sciences Study
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Applied Engineering Science
Transient analysis of laminated plates in thermal environment
...Show More Authors

Transient displacement of laminated plates under combined load based on Mantari' s displacement field are investigated. The solution is implemented under transient mechanical load (sinusoidal, step and triangular sinusoidal distributed pressures pulse) and thermal buckling for plates with different layer orientation and thickness ratio. Equations of motion based on higher-order theory are derived through Hamilton' s principle, and solved using Naviertype solution for simply supported laminated plates. The results are presented for many effective parameters such as the number of laminate and orientation on the dynamic response of plates. Results show the validity of this displacement field in studying response of laminated thick and

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The Difficulties of the opening text between changing and collecting reading in poem (city without rain): The Difficulties of the opening text between changing and collecting reading in poem (city without rain)
...Show More Authors

Abstract
This research deals with the technical of opening text during the critical
study about the poem of Al- ssiyab which is named ( city with out rain)
We chose this poem also to make connection with the western critical
theories.
Our study aims to explain the act of opening texts and critics and its
methods and directions in modern Arabic poetry.
It also aims to show the differences in the point of view between critics
and poetries.
The research depends on dimension vision of selective, and descriptive.

View Publication Preview PDF
Publication Date
Mon Jan 07 2019
Journal Name
Arab Science Heritage Journal
دراسة طبيعة غذاء الحية المائية Natrix tessellata في موسم التكاثر شرق بغداد
...Show More Authors

       جمعت 50 حية مائية Natrix tessellata على وجبتين الأولى 25 حية عند فصل الربيع  تحديدا من منتصف آذار الى منتصف نيسان، اما المجموعة الثانية ، 25 حية لفصل الصيف من منتصف حزيران الى منتصف تموز. اذ عزلت الذكور عن الإناث و حللت قطع من لحم الذكر و قطع من

View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the impact of internal control on tax performance using balanced score card indicators: An applied research in a sample of the branches of the General Tax Authority in Iraq
...Show More Authors

This research dealt with the impact of internal control on tax performance using balanced scorecard indicators because of its special importance in improving tax performance and reform. The internal control system is a safety valve for senior management in all organizations, it plays an important role in the regularity and development of work and the fight against corruption To provide reliable and accurate data and information, follow up on compliance with laws, regulations and instructions. The aim of this research is to demonstrate how control affects tax performance and how to adapt internal control components to improve tax performance. In the General Authority for taxes and its branches,. The research resulted in a number of conclu

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
The Effect of Spatial Organization on the Sustainability of the Neighborhood Unit in the Residential Environment
...Show More Authors

Contemporary residential neighborhoods suffer from weak sustainability of urban residential environments as a result of the adoption of inefficient spatial organization at the neighborhood unit level. This resulted negative characteristics which affected the achievement of sustainable development plans for the residential environment that constitute the majority of the urban fabric of cities.

The physical affordances ,within the vocabulary of recent times,overcame the spiritual ones and affected the residential environment. Accordingly,the concept of space changed in contemporary residential areas through the dominance of the physical aspect (mass) on the symbolic aspect (space).The modern technology occupied an important level b

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Statistical Evalution of Safety Procedures and Chemical Security in Chemical Laboratories / College Ibn Al Haitham
...Show More Authors
Abstract<p>In order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. T</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Studying the Changes in Solar Radiation and Their Influence on Temperature Trend in Iraq for a Whole Century
...Show More Authors

Most studies indicated that the values ​​of atmospheric variables have changed from their general rates due to pollution or global warming etc. Hence, the research indicates the changes of direct solar radiation values ​​over a whole century i.e. from 1900 to 2000 depending on registered data for four cities, namely (Mosul - Baghdad - Rutba - Basra. Moreover, attemptsto correlate the direct solar radiation with the temperature values have been ​​recorded over that period. The results showed that there is a decreasing pattern of radiation quantities over time throughout the study period, where the value of direct radiation over the city of Baghdad 5550 w/m2 was recorded in the year 1900, but this ratio decreased cle

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref