Preferred Language
Articles
/
jcopolicy-551
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional leadership and the prevalence of different tensions between them and the increase in different alliances based on the centrality of the American and Chinese roles, which found resonance in the three-pronged and bilateral axis policies in the interactions of the security environment for the whole region.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 09 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
TIME MANAGEMENT AND WORK PRESSURE AND THEIR RELATIONSHIP TO ADMINISTRATIVE LEADERSHIP/ A CASE STUDY AT THE HIGHER INSTITUTE FOR ADMINISTRATIVE DEVELOPMENT OF SECURITY AND ADMINISRATIVE: TIME MANAGEMENT AND WORK PRESSURE AND THEIR RELATIONSHIP TO ADMINISTRATIVE LEADERSHIP/ A CASE STUDY AT THE HIGHER INSTITUTE FOR ADMINISTRATIVE DEVELOPMENT OF SECURITY AND ADMINISRATIVE
...Show More Authors

The research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of th

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 03 2021
Journal Name
International Journal Of Recent Contributions From Engineering, Science & It
The Influence E-Learning Platforms of Undergraduate Education in Iraq
...Show More Authors

Crossref (1)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
Stability analysis of a competitive ecological system in a polluted environment
...Show More Authors

The interplay of species in a polluted environment is one of the most critical aspects of the ecosystem. This paper explores the dynamics of the two-species Lokta–Volterra competition model. According to the type I functional response, one species is affected by environmental pollution. Whilst the other degrades the toxin according to the type II functional response. All equilibrium points of the system are located, with their local and global stability being assessed. A numerical simulation examination is carried out to confirm the theoretical results. These results illustrate that competition and pollution can significantly change the coexistence and extinction of each species.

View Publication Preview PDF
Scopus (19)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
International Journal Of Professional Business Review
Measuring the Level of Performance of Accounting Units and Their Impact on the Control Environment
...Show More Authors

Purpose: The research aims to study the measurement of the performance of accounting units level of the research sample by using the Federal quality Model European (EFQM)   Design/methodology/approach: the (EFQM) which included seven dimensions "Leadership, Strategic Planning, External Focus, Information and Analysis, Faculty / Staff and Workplace Focus, Process Effectiveness & Outcomes and Achievements" And its effect on the Control Environment, which includes three dimensions: "Integrity, management philosophy and commitment to powers" . the sample is supervisory units of colleges affiliated with the University of Baghdad in Iraq, and a sample was chosen that included fifty-one individuals in the accounting departments.

... Show More
View Publication
Scopus (24)
Crossref (4)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Compare between result of analysis of variance after and before use analysis covariance to Split-blocks design
...Show More Authors

This research aims to study the important of the effect of analysis of covariance manner for one of important of design for multifactor experiments, which called split-blocks experiments design (SBED) to deal the problem of extended measurements for a covariate variable or independent variable (X) with data of response variable or dependent variable Y in agricultural experiments that contribute to mislead the result when analyze data of Y only. Although analysis of covariance with discussed in experiments with common deign, but it is not found information that it is discussed with split-Blocks experiments design (SBED) to get rid of the impact a covariance variable. As part application actual field experiment conducted, begun at

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Motivated Classroom Evaluation Environment for Learning and its Relationship to Feedback Patterns among Teachers of the Second Cycle of Basic Education in the Sultanate of Oman
...Show More Authors

This study aims to investigate the degree of practicing the motivated classroom evaluation environment for learning and its relationship to different feedback patterns. To achieve the objectives of the study, the correlational descriptive research design was employed. A questionnaire was constructed consisting of two parts: the classroom evaluation environment (13) items, and feedback patterns (24) items on a five-point scale. The psychometric properties of the questionnaire were verified in terms of validity and reliability. The questionnaire was applied to a sample of (265) male and female teachers who work in the second cycle schools for grades (5-10) of basic education in all academic majors in the Governorate of Muscat in the Sultan

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Laser
PDF Influence of Er:Cr;YSGG laser Desensitization on SBS of resin cement to dentin
...Show More Authors

Background: Crown preparation of vital teeth involve the removal of a sound tooth structure, and when enamel removed this lead to exposed dentin with an   increase in the number of open dentinal tubules also the diameter of dentinal tubules will increase, furthermore lead to increase movement of fluids inside the tubules all that causes post preparation sensitivity. The aim of this study is to evaluate the effect of desensitizing by Er:Cr:YSGG laser on shear bond strength of prepared tooth and resin cement. Materials and methods: Thirty sound maxillary premolars, grouped into three groups(n=10). Group A is the control group, group B irradiated by Er:Cr:YSGG laser with (0.25 W, 20 Hz, 1

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.