Preferred Language
Articles
/
jcopolicy-587
A future view for the political systems of the Arab Gulf states After normalization ... the United Arab Emirates as a case study
...Show More Authors

The dangers of (Israel's) integration with Arab countries in the middle east region will threaten the Arab security structure dimension, which the latter makes the Arab regional system vulnerable for distortion due to its nominal and symbolic value which is far from the Arab self and questioning with its effectiveness in comparing with the real capabilities to Arab countries in achieving the common targets. So, how to assess the different problems that began to hit the structure of the Arab regional system? and how to pledge an allegiance after putting forward what is known as the American Deal of the Century for the administration of former US President Donald Trump for making another step toward normalization with (Israel)?. The reveal is an additional factor that affect the extent of weakening or fragmentation to the system of the Arab regional environment, being the main objective for both the United States of America and (Israel) alike, hoping to obstruct the outputs of the boundary between the Arab Mashreq and the Maghreb to be dominated by conflict, crises and instability. Especially after the spread of the Corona pandemic in 2020, and many concepts that changed the manner of dealing with the catastrophic issues, which affect the future of the relations of the Arab Gulf region countries that also face a difficult historical experiment and test as a form of the relationship in the post-normalization stage that began in mid-August 2020 with the United Arab Emirates to be a case study of this research in Arab gulf region.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 25 2024
Journal Name
Entrepreneurship Journal For Fiinance And Business
The role of psychological ownerships' dimensions in deterring the effects of toxic leadership: Analytical research in some companies at the Ministry of Industry and Minerals in Iraq
...Show More Authors

The research aims to clarify the role that psychological ownership, through its dimensions, plays in deterring the effects of toxic leadership, through its dimensions, in the Ministry of Industry and Minerals. The research started with a basic problem represented by the following question: "Using psychological ownership and its application in deterring the negative effects of toxic leadership." The research used the descriptive-analytical method. The sample was randomly selected from workers in some selected companies affiliated with the Ministry of Industry and Minerals in Baghdad, and the sample size reached 124 individuals. One of the most important results is that there is an effect of the psychological ownership variable, based on the

... Show More
View Publication
Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Assessing the Activity of Renin and GST in the Serum of Ladies Suffering from Polycystic Ovary Syndrome and COVID-19 to Predict the Danger of Cardiac Disease
...Show More Authors

The coronavirus-pandemic has a major impact on women's-mental and physical-health. Polycystic-ovary-syndrome (PCOS) has a high-predisposition to many cardiometabolic-risk factors that increase susceptibility to severe complications of COVID-19 and also exhibit an increased likelihood of subfertility. The study includes the extent of the effect of COVID-19-virus on renin-levels, glutathione-s-transferase-activity and other biochemical parameters in PCOS-women. The study included 120 samples of ladies that involved: 80 PCOS-patients, and 40 healthy-ladies. Both main groups were divided into subgroups based on COVID-19 infected or not. Blood-samples were collected from PCOS-patients in Kamal-Al-Samara Hospital, at the period between Decembe

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Wed Dec 29 2021
Journal Name
Modern Sport
Effect of rehabilitation exercises in improving the motor range of people with partial rupture of the anterior cruciate ligament of the knee joint by ages (30-35) men
...Show More Authors

The study aimed to prepare rehabilitation exercises using some rubber ropes for people with partial rupture of the anterior cruciate ligament, to recognize their effect on the recovery of motor tides and to reduce the pain of those with partial rupture of the anterior cruciate ligament of the knee joint, and adopted the experimental method by designing the experimental and controlled groups on a sample of those with partial rupture of the anterior cruciate ligament of men (30-35) One year of those who attend the Physiotherapy Center/Rafidain University College of 12 injured were deliberately selected from their community of origin by (100%), and after determining the measuring tools and preparation of exercises applied with rubber r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
A Sociocultural Perspective on Iraqi EFL Learners Reading Comprehension Development
...Show More Authors

 Improving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Lichen planopilaris is a common scarring alopecia among Iraqi population
...Show More Authors

KE Sharquie, AA Noaimi, AF Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 11

View Publication