Preferred Language
Articles
/
jcopolicy-588
Pakistan: The most dangerous terrorist extremism hotbed (a study information, limitations, and factors)
...Show More Authors

   Receipt date:10/27/2021    accepted date:12/15/2021     Publication date:31/12/2021

        Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

The phenomenon of extremist extremism (terrorism) was one of the most prominent issues that took a large space in the twenty-first century, in which cognitive motives were mixed with strategic and ideological motives, leading to the emergence of terrorist extremist movements in countries. Pakistan is among the countries in which these groups appeared, becoming one of the The most dangerous areas of conflict in the world, especially since these terrorist extremist groups are increasing dramatically inside, until they have become one of the most dangerous hot spots for extremism (terrorism), and this is not limited to the movements that originated inside, but has also become an attractive environment for other movements active in different regions. from Pakistan

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 25 2025
Journal Name
Al–bahith Al–a'alami
Semiotics of Political Caricature in the Palestinian Newspapers An Analytical Study
...Show More Authors

This study aims to study the political caricature and its indications in the Palestinian newspapers, to know its subjects, the active characters, the artistic styles, and the symbols the caricaturists use.

The study concluded that there is a variety of subjects that the political caricature handled in the studied newspapers and the degree of interest in every subject. The subjects related to the international subjects came first (% 24.5) and the other subjects came next (% 22.2).

The results showed the caricaturists relied on unnamed symbolic active characters that came first (% 62.3) and named symbolic characters (% 11.1). The positive characteristics of the Palestinian figures were higher than the negative ones, and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 01 2014
Journal Name
Al–bahith Al–a'alami
Demonstrators' slogans in Tahrir square (Analytical study of the communication message)
...Show More Authors

The research entitled "The Slogans of Demonstrators at Al-Tahreer Square – analytical study for communicative letters" studies the slogans of demonstrators as a communicative means having many signs reflecting the political, social, cultural relations exist in the minds of people. It is so easy to understand its meaning, examining its goals; and explaining their meanings. For these reasons, we have chosen such a topic. Since the means of communications transfer letters between a sender and receiver, the importance of this research is that it is a researchable trial to acknowledge the issues behind the demonstrators' slogans and the different styles have been chosen by them for a whole year; the different sides of the demonstration sinc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Ieee Sensors Journal
Calibrating Distance Sensors for Terrestrial Applications Without Groundtruth Information
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Thu Feb 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Drug Information Resources in Iraqi Community Pharmacies (Conference Paper) #
...Show More Authors

Abstract

     Drug information resources are the information that is used in medications discovery, utilization, and management. Little information about different types of resources used by Iraqi community pharmacists is known. Therefore, the objectives were to determine drug information resources' type do the pharmacists used and the common drug information questions they faced during their work in community pharmacy. A cross-sectional descriptive study was conducted in different Iraqi provinces and online self-reported survey was introduced through Google Form Software to an appropriate sample of graduated pharmacists who were working in a private community pharmacy and having at least one

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Integrated System of Information hiding by Applying Three levels
...Show More Authors

MB Mahmood, BN Dhannoon

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Study of charge density distributions, elastic charge form factors and root-mean square radii for 4He, 12C and 16O nuclei using Woods- Saxon and harmonic-oscillator potentials
...Show More Authors

The nuclear charge density distributions, form factors and
corresponding proton, charge, neutron, and matter root mean square
radii for stable 4He, 12C, and 16O nuclei have been calculated using
single-particle radial wave functions of Woods-Saxon potential and
harmonic-oscillator potential for comparison. The calculations for the
ground charge density distributions using the Woods-Saxon potential
show good agreement with experimental data for 4He nucleus while
the results for 12C and 16O nuclei are better in harmonic-oscillator
potential. The calculated elastic charge form factors in Woods-Saxon
potential are better than the results of harmonic-oscillator potential.
Finally, the calculated root mean square

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Study of charge density distributions, elastic charge form factors and root-mean square radii for 4He, 12C and 16O nuclei using Woods- Saxon and harmonic-oscillator potentials
...Show More Authors

The nuclear charge density distributions, form factors andcorresponding proton, charge, neutron, and matter root mean squareradii for stable 4He, 12C, and 16O nuclei have been calculated usingsingle-particle radial wave functions of Woods-Saxon potential andharmonic-oscillator potential for comparison. The calculations for theground charge density distributions using the Woods-Saxon potentialshow good agreement with experimental data for 4He nucleus whilethe results for 12C and 16O nuclei are better in harmonic-oscillatorpotential. The calculated elastic charge form factors in Woods-Saxonpotential are better than the results of harmonic-oscillator potential.Finally, the calculated root mean square radii usingWoods-Saxonpotentials ho

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Use of Social Media Networks (SMNs) in Knowledge Sharing, by Using Social Cognitive Theory (SCT) A Study Conducted in Some of Iraqi Universities
...Show More Authors

   SMNs like Facebook, YouTube, Twitter, WhatsApp,..etc. are among the most popular sites on the Internet. These sites can provide a powerful means of sharing, organizing, finding information and knowledge. The popularity of these sites provides an opportunity to measure the use them in knowledge sharing, which needs a special scale, but unfortunately, there is no special scale for that. Thus, this study supposes to use SCT as a scale to measure the use of SMNs in electronic knowledge sharing due to it has been used to measure knowledge sharing with its traditional form. This study can help the decision-makers to use these SMNs to share the academics’ knowledge in educational institutes to the communi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref