Preferred Language
Articles
/
jcopolicy-606
The Role of Association of Southeast Asian Nations (Asean) in Achieving Regional Security
...Show More Authors

The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of ​​regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve international peace and security, while the proponents of the regional orientation emphasized the importance of establishing regional organizations to achieve this, and from here the theory of “regional peace” arose after the World War the second. Since the capabilities of developing countries to compete are weak, many of these countries have sought to take one form or another of regional cooperation in order to enhance their economic capacity in facing these challenges. In this context, the experience of the Association of Southeast Asian Nations, known as ASEAN for short, represents a distinct model in this regard, which prompted it to be considered a model capable of being emulated by developing countries in their quest to maximize their gains in light of the contemporary international reality. Hence the importance of this research paper, which seeks to identify the factors of success or failure of the “ASEAN” experience in achieving regional security, its weaknesses, the challenges and difficulties it faces, and how to deal with them, in order to identify the extent of the possibilities of benefiting from this experience within the Arab region.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 29 2024
Journal Name
Reviews In Inorganic Chemistry
Antituberculosis, antimicrobial, antioxidant, cytotoxicity and anti-inflammatory activity of Schiff base derived from 2,3-diaminophenazine moiety and its metal(II) complexes: structural elucidation, computational aspects, and biological evaluation
...Show More Authors
Abstract<p>Enticed by the present scenario of infectious diseases, four new Co(II), Ni(II), Cu(II), and Cd(II) complexes of Schiff base ligand were synthesized from 6,6′-((1E-1′E)(phenazine-2,3-dielbis(azanylidene)-bis-(methanylidene)-bis-(3-(diethylamino)phenol)) (<bold>H</bold> <sub> <bold>2</bold> </sub> <bold>L</bold>) to ascertain as effective drug for antituberculosis, anti-inflammatory, antioxidant, cytotoxic and antimicrobial activities. The organic ligand and its metal(II) complexes were characterized by numerous physical and spectroscopic methods, which showed that the</p> ... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Jul 05 2017
Journal Name
Chemical Engineering Communications
Microwave-assisted preparation of mesoporous-activated carbon from coconut (<i>Cocos nucifera</i>) leaf by H<sub>3</sub>PO<sub>4</sub>activation for methylene blue adsorption
...Show More Authors

View Publication
Scopus (122)
Crossref (114)
Scopus Clarivate Crossref
Publication Date
Mon May 15 2023
Journal Name
Alustath Journal For Human And Social Sciences
كاریگەری ستراتیژییەتی بەستن و ڕاكێشان لەسەر دەسكەوتی فێرخوازانی پۆلی هەشتەمی بنەڕەتی له بابەتی زمان و ئەدەبی كوردیدا/ اثر استراتيجية الشد والجذب في تحصيل طلاب الصف الثامن الاساسي في مادة اللغة والادب
...Show More Authors

Preview PDF
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Proposing a Scheme for Human Interactive Proof Test using Plasma Effect
...Show More Authors

            Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أهمية تحليل بيانات النتائج المالية للعملاء: بحث تطبيقي عن التدقيق والمراجعة في سلطنة عمان
...Show More Authors

The main function of the auditing process is to get a financial report provide information about the activities of the economic entities. The financial report's information is intended to be useful in making decisions and planning for entities future. Such information became more effective and efficient if the auditors process analytical auditing procedures, by using those financial analysis tools, which mean more detailed indicators.

The objectives of this research are to investigate auditor's use of analytical procedures in Oman and identify the main objectives for using these procedures. A questionnaire was used to gather the data for the study. A sample of 65 auditors and the response rate was 80% (52).

  &n

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
تقويم جودة واداء خدمة الانترنت من وجهة نظر مالكي مقاهي الانترنت في محافظة بغداد
...Show More Authors

0

View Publication Preview PDF
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Vocabulary Learning Strategies Employed by English as Foreign Language Students at NBU University
...Show More Authors

ABSTRACT

Learning vocabulary is a challenging task for female English as a foreign language (EFL) students. Thus, improving students’ knowledge of vocabulary is critical if they are to make progress in learning a new language. The current study aimed at exploring the vocabulary learning strategies used by EFL students at Northern Border University (NBU). It also aimed to identify the mechanisms applied by EFL students at NBU University to learn vocabulary. It also aimed at evaluating the approaches adopted by EFL female students at Northern Border University (NBU) to learn a language. The study adopted the descriptive-analytical method. Two research instruments were developed to collect data namely, a survey qu

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 25 2019
Journal Name
Journal Of The College Of Education For Women
كنائس وأديرة بغداد في العصر العباسي ودورها الإجتماعي والإقتصادي والثقافي (132- 656هـ/ 749- 1258م)
...Show More Authors

اقيمت الكنائس على جانبي مدينة بغداد الغربي(الكرخ) والشرقي(الرصافة)، أما الأديرة فقد انشئت في موضع مدينة بغداد قبل بنائها وبعد البناء حافظ البعض منها على مكانته وانشئ البعض الآخر، في جانبيها الغربي(الكرخ) والشرقي(الرصافة)، وهو ما سنركز عليه في بحثنا عن كنائس وأديرة بغداد لمختلف الطوائف المسيحية فيها، فضلاً عن تسليط الضوء على دورها الإجتماعي والإقتصادي والثقافي، وإن كان محدوداً جداً وقاصراً على الأديرة أكثر

... Show More
View Publication Preview PDF