Preferred Language
Articles
/
jcopolicy-606
The Role of Association of Southeast Asian Nations (Asean) in Achieving Regional Security
...Show More Authors

The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of ​​regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve international peace and security, while the proponents of the regional orientation emphasized the importance of establishing regional organizations to achieve this, and from here the theory of “regional peace” arose after the World War the second. Since the capabilities of developing countries to compete are weak, many of these countries have sought to take one form or another of regional cooperation in order to enhance their economic capacity in facing these challenges. In this context, the experience of the Association of Southeast Asian Nations, known as ASEAN for short, represents a distinct model in this regard, which prompted it to be considered a model capable of being emulated by developing countries in their quest to maximize their gains in light of the contemporary international reality. Hence the importance of this research paper, which seeks to identify the factors of success or failure of the “ASEAN” experience in achieving regional security, its weaknesses, the challenges and difficulties it faces, and how to deal with them, in order to identify the extent of the possibilities of benefiting from this experience within the Arab region.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
Methodology of Bible Criticism of Muslim Scholars in South Africa Ali Safraz Khan Gumal as a sample
...Show More Authors

This paper and research paper analyzes the critical methodology of "Ali Khan Joommal “ about the Bible , directed in most of the textual criticism of the Torah, and its highest criticism is directed to both the Old and New Testaments.

Joommal  was distinguished by the mental methods and examples accompanying his era, while maintaining the general context in which Muslim scholars had previously followed, and he was distinguished from them by his many citations to the Western literature of Jews or Christians, in short it is a critical phenomenon worthy of study and evaluation.

View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Role of IL-37 and Dectin-1 during Toxoplasmosis
...Show More Authors

Toxoplasmosis is a parasitic infection that triggers immune cells to produce cytokines and inflammatory mediators that are responsible for abnormal or aborted immune responses. This study highlights the evaluation of the Dectin-1 receptor and cytokine IL-37 in the serum of 80 patients who had miscarried in the first trimester and were infected with toxoplasmosis, as well as 40 pregnant women in the first trimester who had a successful pregnancy (control groups). The serum was first screened for the T. gondii IgM and IgG antibodies by an enzyme-linked immunosorbent assay (ELISA) and then the serum levels of IL-37 and Dectin-1 were determined. The results showed that the serum level of Dectin-1 was significantly increased in anti-

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 02 2019
Journal Name
International Journal Of Multidisciplinary And Current Research
The security problem in the Gulf Cooperation Council countries Study on internal challenges and future prospects
...Show More Authors

The importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of accounting disclosure in granting bank financing A field study ona sample of banks operating in the state of Gezira 2022 AD: (دراسة ميدانية على عينة من المصارف العاملة في ولاية الجزيرة 2022م)
...Show More Authors

                 The aim of the research is to identify the adequacy of accounting disclosure in granting bank financing in explaining the role of accounting disclosure in granting bank financing by linking the concepts of full, comprehensive and adequate disclosure to bank financing. The impact of full accounting disclosure on granting bank financing, the existence of an impact of comprehensive accounting disclosure on granting bank financing, the existence of an impact of adequate accounting disclosure on granting bank financing, and the research relied on the descriptive approach, the deductive and inductive approach, the inferential analytical approach, a

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Balanced Scorecard (BSC) role And Six Sigma in improving strategic performance A sample study of the members of the General Company for Northern Cement
...Show More Authors

Assessing performance efficiency is critical to the management need for oversight, planning, and continuous periodic evaluation of the multiple activities of Northern Cement State Company in order to determine the level of achievement of the objectives set, and to correct the deviations and delays that the evaluation shows and limitation of liability. What cannot be measured cannot be managed. The aim of this research is to highlight the impact of using BSC, financial and non-financial, to give comprehensive and clear picture of the company's performance and to measure the quality of its performance by using six-sigma and the level of deviations in achieving the planned goals. Therefore, four-key hypotheses were formulated for th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 16 2020
Journal Name
Baghdad Science Journal
Using Diatom Indices to Evaluate Water quality In Abu-Zirig Marsh Thi-Qar Province /south of Iraq
...Show More Authors

The study attempts to assess water quality in Abu-Zirig Marsh which used epiphytic Diatom community for assessing water quality. Many of Diatom indices {Trophic diatom index (TDI), Diatom index (DI), Generic diatom index (GDI) have been used to give qualitative information about the status of the freshwater ecosystem(good, moderate, high pollution). In this study, the epiphytic diatoms on both host aquatic plants Phragmites australis and Typha domengensis were collected from Abu-Zirig Marsh within Thi-Qar Province at three sites in Autumn, 2018 and winter, 2019. Epiphytic diatoms were Identified by the preparation of permanent slides method, some species of epiphytic diatom showed dominance such as Cyclotella menegh

... Show More
View Publication Preview PDF
Scopus (9)
Scopus Clarivate Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Mon May 05 2025
Journal Name
اعمال المؤتمر الدولي الرابع
جدلية الأمن والتنمية..علاقة التأثير والتأثر
...Show More Authors

يتداخل الأمن مع التنمية تداخلاً بناء وتداخلاً هداماً؛ فالأمن والتنمية مطلبان أساسيان متلازمان في علاقة جدلية تحكم أي علاقة استراتيجية للأمن القومي في أية دولة، ولا يمكن الحديث عن استراتيجية للأمن القومي دونما إرساء دعائم التنمية الاقتصادية والاجتماعية؛ باعتبارها صمام أمان وضمان استراتيجي للعملية الأمنية في بعدها الشامل ، كما إن غياب أو ضعف البنية الأمنية ينعكس بشكل مباشر على التنمية ويهدد بنسف أية مقاربة

... Show More