Preferred Language
Articles
/
jcopolicy-551
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional leadership and the prevalence of different tensions between them and the increase in different alliances based on the centrality of the American and Chinese roles, which found resonance in the three-pronged and bilateral axis policies in the interactions of the security environment for the whole region.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
The effectiveness of the organization in the philosophy of the most prominent theoreticianAdministrative thought
...Show More Authors

بناء على ما تقدم يتضح ان القطاع العام والقطاع الخاص ليسا موقفا ايدولوجيا انتقائيا، وانما هو انبثاق من العمود الفقري للصيرورة الرأسمالية القائمة على تقديس الملكية الخاصة، وان الادوار التي يمكن ان يلعباها ليسا منعزلين عن الحركة العامة للاقتصاد في كليته، وليس هما ابنا السياسات الاقتصادية، والبناء الفوقي بقدر ماهما نتاج الحركة الموضوعية وصيرورة التطور الاجتماعي معبرا عنها في تطور علاقات الانتاج وقوى الانتا

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Partial Cryptography in Digital Media Environment Based on ECC Algebra
...Show More Authors

In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of
researchers and product developers due to its robust mathematical structure and
highest security compared to other existing algorithms like RSA. It is found to give
an increased security compared to RSA for the same key-size or same security as
RSA with less key size. In this paper a new approach is proposed for encrypting
digital image using the arithmetic of elliptic curve algebra. The proposed approach
produced a new mask for encrypt the digital image by use a new convolution
processes based on ECC algebra operations and work as symmetric cryptographic
system instead of asymmetric system. A new approach combined both compression

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
Facilitating Tributaries (Supporters) in the Differences between Al Dhadhiya and Al Dhaiya": Dhadhiya and Al Dhaiya"
...Show More Authors

   الضاد والظاء موطن تفرد العربية وفخرها ، الفت فيهما العشرات والعشرات من المصنفات الثرّة لكثرة ذرائع تلابسهما والخلط بينهما ، فهما متشابهان في هيكل البناء ، وإخراجهما متداخل على اللسان ، وألفاظهما متناظرة برحابة في الإملاء ، فضلاعن  اشكالهما  إلى حدّ الآن ، مما حثني على التفكير في وسائل تسهل المطروح وتمد جسراً بين أجزائه عسى أن تدنو قطافه في دفع الشبهة ومواراتها ، فتحصلت لي امور ادرتها بكلمتين مف

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 07 2022
Journal Name
Himalayan Economics And Business Management
Analyzing and Measuring the Relationship between Monetary Policy and Monetary Stability in the Iraqi Economy for the Period 1990-2020
...Show More Authors

Monetary policy occupies a prominent role in achieving monetary stability by adjusting the growth rates of the number of available means of payment in line with changes in the size of the gross domestic product in the country and expressed by the monetary stability coefficient agreed upon by the International Monetary Fund, a term that hides the fact that there is a rate of change in the volume of commodity or real production which expresses the levels of aggregate supply in the economy, which corresponds to the quantities of cash in circulation, which represent a net purchasing power and stimulate aggregate demand, which completes the picture of the existence of the market mechanism, expressed by the monetary or economic stability

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 26 2019
Journal Name
Iraqi Journal Of Science
Quantum Key Distribution and Chaos Bandwidth Effects on Impact Security of Quantum Communications
...Show More Authors

The influence of bias current on the bandwidth of chaotic signals in semiconductor lasers by optical feedback has been studied experimentally and numerically. The measured data reveal that the bandwidth increase when the system becomes chaotic and this chaotic signal has a broadband spectrum so it can be used as a carrier for the quantum key. Mixing chaotic signal and quantum key make a very small change in chaotic bandwidth that does not affect the security of data transmitted.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Measure the effectiveness of the Balanced Scorecard strategic performance management in public institutions of Jordan )An Empirical Study on the Social Security Corporation – Irbid(
...Show More Authors

The goal of this research to identify a set of criteria that can be measured on the basis of which the effectiveness of the application of the Balanced Scorecard in the Jordanian Public Institutions in order to identify the basic requirements to ensure the application of balanced performance measures. The study population consisted of the staff of the Public Institution for Social Security - Irbid of directors of departments and heads of departments and administrative staff, was the use of a random sample of (50) an employee and the employee. The questionnaire was used as a tool to collect data, and as a result of subjecting these standards for the field test and the use of statistical analysis tools to the results of the study c

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Knowledge of marketing and its impact on the performance of the company for the distribution of oil products –an exploratory study of the views of asample in the general company for oil products distribution/ Distribution Authority, Baghdad
...Show More Authors

This study seeks to address the impact of marketing knowledge dimensions (product, price, promotion, distribution) on the organizational performance in relation to a number of variables which are (efficiency, effectiveness, market share, customer satisfaction), and seeks to reveal the role of marketing knowledge in organizational performance.

In order to achieve the objective of the study the researcher has adopted a hypothetical model that reflects the logical relationships between the variables of the study. In order to reveal the nature of these relationships, several hypotheses have been presented as tentative solutions and this study seeks to verify the validity of these hypotheses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Comparison between HSV-1 Ag detection techniques by ELISA and real-time PCR in breast cancer patients suffering from periodontitis
...Show More Authors

Background: Periodontitis is a long-standing infection that destroys the gums, periodontal ligaments, and the alveolar bone that supports the teeth. Inflammation of the gums and chronic periodontitis are both caused by the bacteria in the dental plaque and the herpes viruses, especially types 1 and 2 of the herpes simplex virus.

Objectives: To compare the ELISA and real-time PCR as ways to detect the herpes simplex virus in breast cancer pat

J Fac Med Baghdad

2023; Vol.65, No. 3

Received:March., 2023

Accepted: June. 2023

Published: Oct. 2023

 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of International Society Of Preventive And Community Dentistry
The impact of dental environment stress on dentition status, salivary nitric oxide and flow rate
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref