Preferred Language
Articles
/
jcopolicy-65
Polar structure in the international system
...Show More Authors

Conclusion The observation of the phenomenon of structural evolution of the international system and its instability on a particular situation, by its transition from unipolar to polarity to bipolarism and then to unilateralism in the early 1990s led by the United States, and to the present moment, To say that the structure by which the hierarchy of superpowers or the regime is directed in terms of its various capacities that qualify it, and with the consent of the rest of the States directing the regime to lead and lead the world's first place, has no direct relation to the stability of this system, I hope other more influential in its stability. The structure of the new international order will be completely different in terms of the roles and legal rules governing the relationship between these roles. Therefore, the stability of this system will be based on very different foundations from the foundations of the international system since the Treaty of Westphalia to the present. This research deals with the stages of development of the international system first, and then describes the current international system II, to the factors affecting the polar structure

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Nelson-Olson Method and Two-Stage Limited Dependent Variables (2SLDV ) Method for the Estimation of a Simultaneous Equations System (Tobit Model)
...Show More Authors

This study relates to  the estimation of  a simultaneous equations system for the Tobit model where the dependent variables  ( )  are limited, and this will affect the method to choose the good estimator. So, we will use new estimations methods  different from the classical methods, which if used in such a case, will produce biased and inconsistent estimators which is (Nelson-Olson) method  and  Two- Stage limited dependent variables(2SLDV) method  to get of estimators that hold characteristics the good estimator .

That is , parameters will be estim

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Density, Viscosity and Refractive Index of the Ternary System (Ethanol + N-Hexane +3-Methyl Pentane) at 20, 30, 40 °C and 101.325 Kpa
...Show More Authors

Experimental densities, viscosities η, and refractive indices nD data of the ternary  ethanol+ n-hexane + 3-methyl pentane system have been determined at temperatures 293.15,303.15 and 313.15 K and at atmospheric pressure then these properties were calculated theoretically by using mixing rules for densities, viscosities and refractive indices .After that the theoretical data and the experimental data were compared due to the high relative errors in viscosities an equation of viscosity was proposed to decrease the relative errors.

View Publication Preview PDF
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 14 2023
Journal Name
Iete Journal Of Research
Performance Enhancement of VLC-NOMA Employing Beamforming Function based vehicle-to-multivehicle Communication system
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection

... Show More
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Eliminate harmful side – effects of Controls System by designing Activity – Based Responsibility Accounting model
...Show More Authors

This research has come out with that, function-based responsibility accounting system has harmful side – effects preventing it of achieving its controlling objective, that is, goal congruence, which are due to its un integrated measures, its focus on measuring measurable behaviors while neglecting behaviors that are hardly measured, and its dependence on standard operating procedures.

In addition, the system hypotheses and measures are designed to fit previous business environment, not the current environment.

The research has also concluded that the suggestive model, that is, activity-based responsibility accounting is designed to get ride of harmful side – effects of functi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Design of Multi-Rate Multi-Zone Wireless Fuzzy Temperature Control System for Greenhouse Application
...Show More Authors

sensor sampling rate (SSR) may be an effective and crucial field in networked control systems.  Changing sensor sampling period after designing the networked control system is a critical matter for the stability of the system. In this article, a wireless networked control system with multi-rate sensor sampling is proposed to control the temperature of a multi-zone greenhouse. Here, a behavior based Mamdany fuzzy system is used in three approaches, first is to design the fuzzy temperature controller, second is to design a fuzzy gain selector and third is to design a fuzzy error handler. The main approach of the control system design is to control the input gain of the fuzzy temperature controller depending on the cur

... Show More
View Publication Preview PDF
Crossref