Preferred Language
Articles
/
jcopolicy-616
Applications of contemporary feminist theory and its role in international relations (Singapore as a Model)
...Show More Authors

Since the emergence of the science of international relations as an independent academic scientific field,  various theories and trends have appeared and have tried to understand and explain the international reality and give a clear picture of what is happening within the international system of interactions and influences and the search for tools for stability and peace in international relations. Among these theories is the feminist theory, which is a new intellectual trend on the level of international relations theories,  which tried to give an explanation of what is happening in world politics and in international relations in particular. The main issue that feminist theory is concerned with is the lack of women’s subordination to men or their dominance over women, given that women and the matters related to them are different, low and of less value than men, especially reducing their role in making decision. The Oxford Dictionary defines feminist theory as the recognition of women's rights and equal opportunities to men at various levels of scientific and practical life.

The demand for women’s rights began in the first founding conference held in Paris in 1892, the most important of which are the rights to education, the right to vote, and to have a role in decision-making. During the leadership of countries whose role has increased recently until the number of countries ruled by women reached more than (16) countries, their rule witnessed distinguished leadership at all levels,  especially in managing the crisis of the Covid 19 epidemic,; it encouraged the pioneers of feminist theory to provide the advantages of feminist leadership that achieve political, economic and social stability, thus achieving international peace, security and stability of international relations. The existence of wars and instability is due to the patriarchal world and the presence of men in decision-making and the best solution is the leadership of women who have proven their success in wisdom such as (Germany, Croatia, New Zealand,  Singapore .... and others). This research takes Singapore as a model and it will focus on the Singaporean experience in the leadership of women represented by Mrs. Halima Yaqoub, a Muslim woman of Indian origin who won the election in 2017 and became the eighth president of Singapore without entering an electoral race as no one is nominated with her. The Southeast Asian country is considered the fourth largest financial center in the world and one of the richest countries in the region and the most stable country politically.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jun 08 2021
Journal Name
Biomolecules
A Pan-Inhibitor for Protein Arginine Methyltransferase Family Enzymes
...Show More Authors

Protein arginine methyltransferases (PRMTs) play important roles in transcription, splicing, DNA damage repair, RNA biology, and cellular metabolism. Thus, PRMTs have been attractive targets for various diseases. In this study, we reported the design and synthesis of a potent pan-inhibitor for PRMTs that tethers a thioadenosine and various substituted guanidino groups through a propyl linker. Compound II757 exhibits a half-maximal inhibition concentration (IC50) value of 5 to 555 nM for eight tested PRMTs, with the highest inhibition for PRMT4 (IC50 = 5 nM). The kinetic study demonstrated that II757 competitively binds at the SAM binding site of PRMT1. Notably, II757 is selective for PRMTs over a panel of other methyltransferases, w

... Show More
View Publication
Scopus (22)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Solving a three dimensional transportation problem using linear programming
...Show More Authors

Transport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon Oct 06 2025
Journal Name
Engineering, Technology & Applied Science Research
Encased Pultruded GFRP Beams with Shear Connectors: A Review
...Show More Authors

This study examines the structural performance of concrete-encased pultruded Glass Fiber Reinforced Polymer (GFRP) I-sections with shear connections. It specifically focuses on how different parameters affect the latter’s ductility, flexural strength, and load-carrying capacity. The key variables studied include various shear connector types, spacing, and geometries, as well as the compressive strength of concrete and the properties of GFRP. The finite element modeling and experimental validation show that the shear connectors significantly improve the ductility, ultimate capacity, and load transmission efficiency. The present review emphasizes that the shear connectors greatly enhance the structural performance when they are prop

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Ranking Function to Solve a Fuzzy Multiple Objective Function
...Show More Authors

In this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better

View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Three-Dimensional Seismic Response Analysis for a Rockfill Dam
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref