Preferred Language
Articles
/
jcopolicy-606
The Role of Association of Southeast Asian Nations (Asean) in Achieving Regional Security
...Show More Authors

The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of ​​regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve international peace and security, while the proponents of the regional orientation emphasized the importance of establishing regional organizations to achieve this, and from here the theory of “regional peace” arose after the World War the second. Since the capabilities of developing countries to compete are weak, many of these countries have sought to take one form or another of regional cooperation in order to enhance their economic capacity in facing these challenges. In this context, the experience of the Association of Southeast Asian Nations, known as ASEAN for short, represents a distinct model in this regard, which prompted it to be considered a model capable of being emulated by developing countries in their quest to maximize their gains in light of the contemporary international reality. Hence the importance of this research paper, which seeks to identify the factors of success or failure of the “ASEAN” experience in achieving regional security, its weaknesses, the challenges and difficulties it faces, and how to deal with them, in order to identify the extent of the possibilities of benefiting from this experience within the Arab region.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 18 2025
Journal Name
Journal Of The College Of Education For Women
دلالة الفعل المزيد في الخطبة الشقشقيّة للإمام عليّ (عليه السلام)
...Show More Authors

View Publication
Publication Date
Sat Dec 02 2023
Journal Name
مجلة الترجمة واللسانيات
الحبكة ودورها في الادب القصصي نماذج مختارة من الكتاب المقدس
...Show More Authors

يصصقلا بدلاا يف اهتيمهاو اهرود ةكبحلا عوضوم ىلع ءوضلا ثحبلا طلسي لكشب يتاروتلا يصصقلا بدلاا يف ةكبحلاو ماع لكشب اهبيكارتو اهعاونا ثيح نم ضرع نم أدبي يذلا يمرهلا لسلستلاو ةصقلا رصانع مها زارباب ثحبلا متها .صاخ يلاتلابو ةورذلا ةطقن ىلا ً لاوصو ثادحلاا ديقعتو تاعارصلاو ، )ةمدقملا( ثادحلاا نوكت نا اما ةياهنلا كلتو ةصقلا ةياهن ىلا لاوصو تامزلاا كلت لحل طوبهلا أدبي .ةمزلاا لحل لصت ةقلغم ةياهن وا هسفنب ةياهنلا را

... Show More
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Emergency Fuel Rationing system using RFID Smart Cards
...Show More Authors

Rationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Stability Study of V(IV), Zr(IV), Rh(III), Pd(II), Cd(II) and Hg(II) Complexes with Pyrazol Derivative
...Show More Authors

In this work lactone (1) was prepared from the reaction of p-nitro phenyl hydrazine with ethylacetoacetate, which upon treatment with benzoyl chloride afforded the lactame (2). The reaction of (2) with 2-amino phenol produced a new Schiff base (L) in good yield. Complexes of V(IV), Zr(IV), Rh(III), Pd(II), Cd(II) and Hg(II) with the new Schiff base (L) have been prepared. The compounds (1, 2) were characterized by FT-IR and UV spectroscopy, as well as characterizing ligand (L) by the same techniques with elemental analysis (C.H.N) and (1H-NMR). The prepared complexes were identified and their structural geometries were suggested by using elemental analysis (C.H.N), flame atomic absorption technique, FT-IR and UV-Vis spectroscopy, in additio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Developing a Predictive Model and Multi-Objective Optimization of a Photovoltaic/Thermal System Based on Energy and Exergy Analysis Using Response Surface Methodology
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Feb 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Qualitative and Quantitative Estimation or Chemical Constituents from Leaves and Roots of Iraqi Agave Attenuata by GC-MS and RP-HPLC(Conference Paper) #
...Show More Authors

This research concentrate on cultivated Iraqi Agave attenuata dried leaves and roots, because of little studies on this plant especially on the root that lead to the eager of study and comparison of phytochemical constituents between leaves and root. Extraction of bioactive constituents was carried out using several solvents with increasing polarity (n-hexane, ethyl acetate and methanol) by soxhlet apparatus. Steroidal saponins in Agave genus is well documented in many species, lightening the minds in this research on extraction method which is specific for steroidal saponins. Phytochemical screening was done by GC/MS for n-hexane fraction, qualitative and quantitative estimation of several bioactive constituents (caffe

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Crossref