Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2025
Journal Name
Al–bahith Al–a'alami
Media separation: The Relationship of Arab Immigrants with the Media of the Countries of Diaspora (Sweden as a model) (A Research Derived from PhD Dissertation)
...Show More Authors

The research seeks to study the subject (Media separation: the Relationship of Arab Immigrants with the Media of the Countries of Diaspora/ Sweden as a model). Where this phenomenon, "problem" has not been subjected to an in-depth study to find out the causes of this media separation and its repercussions on the immigrant, whether in the problem of integration, or his opportunity to work, or adapt to live in the new society.

Separation is a kind of word that is rarely used in Arabic media studies, relevant, sometimes, to the meaning of “refraining from watching TV or listening to the radio or reading newspapers”. Sometimes, it means “not tuning to or using any form of media like radios or newspapers to be updated about what

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Arab Food's Security
...Show More Authors

Arab Food's Security

View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Security Intellectual Proposals of the Paris and the Wales Schools
...Show More Authors

The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties  of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The phenomenon of military governments in the Arab countries
...Show More Authors

The modern nation state, by virtue of its institutional nature, is divided into political and non-political institutions according to their respective jurisdictions. It is natural for non-political institutions to perform their functions under the control of the political establishment, for two reasons: first, Second: Ensuring the achievement of cooperation, harmony and integration between these different institutions in serving the stability of the society and its continuity and achieving its supreme objectives. The location of the military establishment is part of the non-political institutions of the state, since it carries out a non-political function that is based on defending the homeland against any threats that may threaten its s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jan 05 2012
Journal Name
International Journal Of Scientific Research
The Influence of Parsley ( Petroselinum crispum ) as Feed Additive on Hematological Traits of Local Iraqi Geese
...Show More Authors

This study was conducted to investigate the effect of feeding diets containing different levels of parsley on the hematological traits of local Iraqi geese. A total of twenty-four local geese, one year old, were used in this experiment. The birds were allocated into four treatment groups, consisting of six geese each. Treatment groups were: control diet (C) (free from parsley); T1: control diet + 80 g/d parsley; T2: control diet + 160 g/d parsley; and T3: control diet + 240 g/d parsley. At the end of the experiment, blood samples were obtained from all geese from the brachial vein by venipuncture. Hematological traits included in this study were red blood cells count (RBC), hemoglobin concentration (Hb), packed cell volume (PCV), mean cell

... Show More
Preview PDF
Publication Date
Mon Jan 07 2019
Journal Name
Arab Science Heritage Journal
علـم الفلـك فـي التـراث العربـي الإسلامـي
...Show More Authors

  يعد علم الفلك أحد العلوم القديمة، فقد إهتم علماء الفلك الأوائل بهذ العلم، تاركين بصماتهم عليه، ودعوا إلى عدم الخلط بين علم الفلك وبين التنجيم، وهو نظام يعتقد أن هناك علاقة بين الشؤون الإنسانية ومواضع الأجسام السماوية، حيث يختلف المجالان تماماً عن بعضهما، كما ناقش العرب عدم سكونية الأرض في مركز الكون، وإنها كانت محور إهتمام الفلاسفة كأبن سينا والرازي، ومن ثم العلماء الفلكيين كالبيروني والخوار

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Slums and its implication on security in Baghdad
...Show More Authors

The research team seeks to study the phenomena of random housing in Iraqi society in general and Baghdad city in particular by standing on the causes behind this phenomena and its relation with security situation in Baghdad. The researchers adopted a theoretical and practical framework. The main objective is to diagnose the risks caused by the escalation of slums in Baghdad city. 

View Publication Preview PDF