Preferred Language
Articles
/
jcopolicy-606
The Role of Association of Southeast Asian Nations (Asean) in Achieving Regional Security
...Show More Authors

The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of ​​regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve international peace and security, while the proponents of the regional orientation emphasized the importance of establishing regional organizations to achieve this, and from here the theory of “regional peace” arose after the World War the second. Since the capabilities of developing countries to compete are weak, many of these countries have sought to take one form or another of regional cooperation in order to enhance their economic capacity in facing these challenges. In this context, the experience of the Association of Southeast Asian Nations, known as ASEAN for short, represents a distinct model in this regard, which prompted it to be considered a model capable of being emulated by developing countries in their quest to maximize their gains in light of the contemporary international reality. Hence the importance of this research paper, which seeks to identify the factors of success or failure of the “ASEAN” experience in achieving regional security, its weaknesses, the challenges and difficulties it faces, and how to deal with them, in order to identify the extent of the possibilities of benefiting from this experience within the Arab region.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 06 2013
Journal Name
Journal Of Educational And Psychological Researches
رؤية وانموذج- مقترح للارشاد النفسي والتوجيه التربوي في ظل نظام ادارة الجودة الشاملة
...Show More Authors

The global challenges of contemporary facing societies urge to seek and move to adopt the style conscious in the face of these challenges and work on the investment of human resources and energies humanitarian efficient and effective for the development of the institutional and Management and make it more efficient and effective and meets the requirements and keep pace with global developments , and more aspects of managerial aim is Total Quality Management , as it has become thanks to the sheer amount and large accelerated technical developments and information and communication technologies , which feature of this era , and in the field of education , the charge of it are seeking through the application of total quality management to b

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
« L'agressivité de la parole et de l'acte » dans Haute Surveillance et Les Bonnes de Jean Genet
...Show More Authors

Sommaire

                      La question de la violence et de l'agressivité  porte une importance remarquable dans l’esprit de Jean Genet qui estime le crime   en le considérant comme beau. Il lui donne une valeur suprême. Il le glorifie avec ses personnages criminels.   Le langage théâtral genétien est violent qui conduit à la fin à l’acte agressif, le crime et la mort. Ce théâtre qui aborde la condition humaine retrace sur la scène le chemin tragique de l’homme moderne.               

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 14 2018
Journal Name
Arab Science Heritage Journal
السل االدكتور محمد حسن سلمان الحمامي ودورهُ في مكافحة مرض التدرن الرئوي (السل
...Show More Authors

Mohammed Hassan Salman is one of the Iraqi national figures who put a clear mark to promote the health institution and to improve the Iraqi people, even it was written about him as "The man who struggled to fight the tuberculosis", He began to struggle against this social courage that has been killing hundreds of Iraqis since his joining of Association for combating tuberculosis in 1999 and his big role in the application of (B-C-G) for the first in Iraq.

View Publication Preview PDF
Publication Date
Sat Mar 15 2025
Journal Name
مجلة دراسات وبحوث التربية الرياضية
تأثير تمرينات تعليمية بأسلوب التمرين المتغير في الاداء الفني لفعالية الوثب العالي للطالبات
...Show More Authors

هدف البحث الى إعداد تمرينات تعليمية  بأسلوب التمرين المتغير واثره في تعلم مراحل فعالية الوثب العالي, واستخدمت الباحثون المنهج التجريبي على عينة من (20) طالبة في المرحلة الرابعة جامعة بغداد كلية التربية البدنية وعلوم الرياضة للبنات شعبة ( ب), مقسمين الى مجموعتين تجريبية وضابطة , واستخدم الباحثون منهج تعليمي بأسلوب التمرين المتغير للمجموعة التجريبية لمدة (6 أسابيع) بواقع وحدتين تعليمية في الأسبوع , واستنتجت

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon May 15 2023
Journal Name
Alustath Journal For Human And Social Sciences
كاریگەری ستراتیژییەتی بەستن و ڕاكێشان لەسەر دەسكەوتی فێرخوازانی پۆلی هەشتەمی بنەڕەتی له بابەتی زمان و ئەدەبی كوردیدا/ اثر استراتيجية الشد والجذب في تحصيل طلاب الصف الثامن الاساسي في مادة اللغة والادب
...Show More Authors

Preview PDF
Publication Date
Wed Sep 25 2013
Journal Name
International Journal For Sciences And Technology
Synthesis, Characterization, And Antibacterial Activities Of Manganese (II),Cobalt(II), Copper(II) ,Iron (II), Nickel (II) And Cadmium(II) Mixed- Ligand Complexes Containing Amino Acid( L- Lysine) And 1,10-Phenanthroline
...Show More Authors

The research includes the synthesis and identification of the mixed ligands complexes of M(II) Ions in general composition [M(Lyn)2(phen)] Where L- lysine (C6H14N2O2) commonly abbreviated (LynH) as a primary ligand and 1,10-phenanthroline(C12H8N2) commonly abbreviated as "phen," as a secondary ligand . The ligands and the metal chlorides were brought in to reaction at room temperature in ethanol as solvent. The reaction required the following molar ratio [(1:1:2) (metal): phen:2 Lyn -] with M(II) ions, were M = Mn(II),Cu(II), Ni(II), Co(II), Fe(II) and Cd(II). Our research also includes studying the bio–activity of the some complexes prepared against pathogenic bacteria Escherichia coli(-),Staphylococcus(-) , Pseudomonas (-), Bacillus (-)

... Show More
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conf. Series
Composition, Characterization and Antibacterial activity of Mn(II), Co(II),Ni(II), Cu(II) Zn(II) and Cd(II) mixed ligand complexes Schiff base derived from Trimethoprim with8- Hydroxy quinoline
...Show More Authors

New Schiff base ligand 2-((4-amino-5-(3, 4, 5-trimethoxybenzyl) pyrimidin- 2-ylimino) (phenyl)methyl)benzoic acid] = [HL] was synthesized using microwave irradiation trimethoprim and 2-benzoyl benzoic acid. Mixed ligand complexes of Mn((ІІ), Co(ІІ), Ni(ІІ), Cu(ІІ), Zn(ІІ) and Cd(ІІ) are reacted in ethanol with Schiff base ligand [HL] and 8-hydroxyquinoline [HQ] then reacted with metal salts in ethanol as a solvent in (1:1:1) ratio. The ligand [HL] is characterized by FTIR, UV-Vis, melting point, elemental microanalysis (C.H.N), 1H-NMR, 13C-NMR, and mass spectra. The mixed ligand complexes are characterized by infrared spectra, electronic spectra, (C.H.N), melting point, atomic absorption, molar conductance and magnetic moment me

... Show More
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref