Preferred Language
Articles
/
jcopolicy-606
The Role of Association of Southeast Asian Nations (Asean) in Achieving Regional Security
...Show More Authors

The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of ​​regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve international peace and security, while the proponents of the regional orientation emphasized the importance of establishing regional organizations to achieve this, and from here the theory of “regional peace” arose after the World War the second. Since the capabilities of developing countries to compete are weak, many of these countries have sought to take one form or another of regional cooperation in order to enhance their economic capacity in facing these challenges. In this context, the experience of the Association of Southeast Asian Nations, known as ASEAN for short, represents a distinct model in this regard, which prompted it to be considered a model capable of being emulated by developing countries in their quest to maximize their gains in light of the contemporary international reality. Hence the importance of this research paper, which seeks to identify the factors of success or failure of the “ASEAN” experience in achieving regional security, its weaknesses, the challenges and difficulties it faces, and how to deal with them, in order to identify the extent of the possibilities of benefiting from this experience within the Arab region.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 18 2023
Journal Name
Arab Science Heritage Journal
الإمام الرُّعيني (ت 476هـ) وأثره في كتب القراءات
...Show More Authors

It is known that the distinguished scholar and writers in any kind of science leave an important impact on those who come after them, so they are an indispensable source in that science that draws from them who is later in time than them, and this is what we have seen in this research; The scholar Muhammad bin Shuraih al-Ra’ini (d.476 AH) and his book          (Al-Kafi in the Seven Readings) were admired by everyone who wrote about the readings after him. The great scholars of the readings, such as Ibn al-Bathish (d. 540 AH), Ibn al-Jazari (d. 833 AH), and Ibn al-Banna’ did not dispense with him. (d.1117 AH) in terms of reading, isnad, and the way of narration, their books were full of men

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 15 2018
Journal Name
Arab Science Heritage Journal
قضايا قضايا المرأة في ظل لائحة حقوق الانسان
...Show More Authors

Women are a social entity and can not be ignored starting from the process of creation Almighty and through the fact that it represents half of society and a fundamental factor and the corner can not be dispensed with in the composition of the family it is no longer acceptable to leave women to perform their role social and cultural or competitive and political role and in all aspects of political activity, It was not only women but the entire society lived loss, anxiety and oppression, a natural state created by deviation from the teachings and values of civil and followers of the corrupt positions in perception and conscience and behavior and links and relations and transactions until corruption became prevalent in all Social, economic

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2008
Journal Name
Journal Of Educational And Psychological Researches
اثرالتعلم باللعب في السلوك العدواني لدى اطفال الروضه
...Show More Authors

يستهدف البحث التعرف على اهمية التعلم باللعب لاطفال رياض الاطفال وانعكاساتها على تعديل سلوكهم، حيث ان اللعب هو دنيا الطفل المليئة بالمتعة والاستطلاع والاستكشاف، كما ان اللعب بالنسبة للاطفال يمثل لهم الحياة بكل ما فيها من معنى.

وفي الوقت نفسه اللعب هو وسيلة من وسائل الضبط والتوجيه للتعامل مع سلوك الاطفال، فمن خلال اللعب نستكشف النبوغ والتفوق منذ وقت مبكر، حيث ان التعلم باللعب يمثل حاجة حيو

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 19 2018
Journal Name
Arab Science Heritage Journal
فلسفة فلسفة اللغة و أثرها في الإعجاز القرآني
...Show More Authors

Praise be to God, prayer and peace upon our master Muhammad the Messenger of Allah peace be upon him mercy, gift, and grace, and rendered his family and the good righteous is followed until the Day of Judgment. After: The Koran

View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Sun Jul 31 2022
Journal Name
Journal Of Computational Innovation And Analytics (jcia)
PERFORMANCE MEASURE OF MULTIPLE-CHANNEL QUEUEING SYSTEMS WITH IMPRECISE DATA USING GRADED MEAN INTEGRATION FOR TRAPEZOIDAL AND HEXAGONAL FUZZY NUMBERS
...Show More Authors

In this paper, a procedure to establish the different performance measures in terms of crisp value is proposed for two classes of arrivals and multiple channel queueing models, where both arrival and service rate are fuzzy numbers. The main idea is to convert the arrival rates and service rates under fuzzy queues into crisp queues by using graded mean integration approach, which can be represented as median rule number. Hence, we apply the crisp values obtained to establish the performance measure of conventional multiple queueing models. This procedure has shown its effectiveness when incorporated with many types of membership functions in solving queuing problems. Two numerical illustrations are presented to determine the validity of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 09 2026
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of Gutta-Percha Penetration Depth into Simulated Lateral Canals by Using Three Different Obturation Techniques (A Comparative Study)
...Show More Authors

Background:sThe aims of this study were to evaluate and compare the ability of three different techniques to obdurate simulated lateral canals, evaluate the effect of the main canal curvature on obturation of lateral canals and compare the gutta-percha penetration between coronal and apical lateral canals. Materials and methods: Resin blocks with 30 straight and 30 curved were used in this study. Each canal has two parallel lateral canals. The main canal has 0.3 mm apical diameter and 0.04 taper. The canals were divided into six groups according to canal curvature and obturation techniques used (n=10): Groups C1 and C2: straight and curved canals obturated with continuous wave technique using E&Q masterTM system. Groups O1 and O2: straight

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Optics
Structural and optical properties of C60-ZnO thin films synthesized by spray pyrolysis technique with plasma treatment as antibacterial activity
...Show More Authors

Spray pyrolysis technique was used to make Carbon60-Zinc oxide (C60-ZnO) thin films, and chemical, structural, antibacterial, and optical characterizations regarding such nanocomposite have been done prior to and following treatment. Fullerene peaks in C60-ZnO thin films are identical and appear at the same angles. Following the treatment of the plasma, the existence regarding fullerene peaks in the thin films investigated suggests that the crystallographic quality related to C60-ZnO thin films has enhanced. Following plasma treatment, field emission scanning electron microscopy (FESEM) images regarding a C60-ZnO thin film indicate that both zinc oxide and fullerene particles had shrunk in the size and have an even distribution. In addition

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref