Preferred Language
Articles
/
jcopolicy-87
Towards a new global leadership to combat international terrorism
...Show More Authors

In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle East in favor of their organization. They tried to co-opt the jihad volunteers who traveled to Bosnia after the break-up of Yugoslavia in 1992 after the Bosnian army was able to contain them but ended up expelling them in the fall of 1995. A year later, al-Qaeda achieved greater success in supervising the training of Pakistani fighters who were smuggled into Kashmir to play a combat role In Afghanistan and elsewhere. Al-Qaeda members have also succeeded in excluding local supporters of Kashmir's independence and mixing the cards between national independence,

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A proposed program to audit the performance of the hotel sector under crises (Applied Research)
...Show More Authors

Abstract:

        The research sought to identify the crises that occurred during the research period and their reflection on the performance of the hotel Research sample as well as to identify the reality of auditing the hotel Research sample and the preparation of a performance audit program can be adopted in auditing the performance of hotels in light of crises, and the problem of the research lies in the lack of a program to audit the performance of hotels that takes into account the crises experienced by the hotel sector, The research was based on solving its problems on three hypotheses, the first is that the performance audit in light of the Covid-19 pand

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using Elastic Properties as a Predictive Tool to Identify Pore-Fluid Type in Carbonate Formations
...Show More Authors

The aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
What Bukhari shortened to a bug in its attribution: (Applied study in the correct mosque)
...Show More Authors

This study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.

View Publication Preview PDF
Publication Date
Sat Nov 15 2025
Journal Name
Al-mustansiriyah Journal Of Science
Epidemiological Study to Investigate a Possible Vector of Visceral Leishmaniasisin the Central Region of Iraq
...Show More Authors

An epidemiological study in Al-Mahmmodiya (50 km south Baghdad) to investigate a possible vector of Leishmaniasis were applied .This region is considered as a foci of Leishmaniasisaccording to the health association statistics. CDC light traps were used to collect the insects nightly. Insects were collected by Indoor application as human dwellings and animal shelters and Outdoor application as rodent's barrows and field trees. Sand flies were transported to the laboratory, isolated and identified according to the identification keys in Tropical Biological Researches Unit at the Collage of Science / University of Baghdad. Must of the collected sand flies were belonging to three species PhlebotomuspapatasiScopoli(45%), PhlebotomusalexandriSin

... Show More
View Publication
Publication Date
Sat Nov 15 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Maximum bite force among a group of Iraqi children in relation to mandibular growth rotation
...Show More Authors

View Publication
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A Novel Approach to Improving Brain Image Classification Using Mutual Information-Accelerated Singular Value Decomposition
...Show More Authors

View Publication
Scopus (45)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Design and Construction of a Testing Platform and Estimating Attenuation Painting Reflectivity to Laser Beam
...Show More Authors

The project has been described the design and construction of a reliable optical testing platform used for evaluate the reflectivity of metal surfaces treated with special paintings required for laser beam attenuation. The platform comprises an Nd-YAG laser system which has been designed and fabricated with specifications to be compatible with their corresponding in laser range finder transmitters used for various applications. The reflectivity of various attenuating paintings, at different detection angles, has been observed. Moreover, the variation of the reflected energy with painting type and metal type to be painted has been studied experimentally. Results illustrated the existence of a definite angle, at which the reflectivity was max

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of Engineering
DESIGN OF A VARIABLE GAIN NONLINEAR FUZZY CONTROLLER AND PERFORMANCE ENHANCEMENT DUE TO GAIN VARIATION
...Show More Authors

In this paper, variable gain nonlinear PD and PI fuzzy logic controllers are designed and the effect of the variable gain characteristic of these controllers is analyzed to show its contribution in enhancing the performance of the closed loop system over a conventional linear PID controller. Simulation results and time domain performance characteristics show how these fuzzy controllers outperform the conventional PID controller when used to control a nonlinear plant and a plant that has time delay.

Publication Date
Sun Jan 01 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees22fr
A theoretical enhancement of electronic transfer dynamics in the D35CPDT dye donor to 𝑻𝒊𝑶𝟐 acceptor
...Show More Authors

View Publication
Crossref