Preferred Language
Articles
/
jcopolicy-87
Towards a new global leadership to combat international terrorism
...Show More Authors

In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle East in favor of their organization. They tried to co-opt the jihad volunteers who traveled to Bosnia after the break-up of Yugoslavia in 1992 after the Bosnian army was able to contain them but ended up expelling them in the fall of 1995. A year later, al-Qaeda achieved greater success in supervising the training of Pakistani fighters who were smuggled into Kashmir to play a combat role In Afghanistan and elsewhere. Al-Qaeda members have also succeeded in excluding local supporters of Kashmir's independence and mixing the cards between national independence,

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
نحو الجملة البسيطة المعقدة
...Show More Authors

نحو الجملة البسيطة المعقدة

View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Detection of Methamphetamine using Nanobentonite as a Novel Solid Phase Extraction Column Matrix Assisted with Gas Chromatography- Mass Spectroscopy
...Show More Authors

          This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
الطبعة الاولى
التنظيم القانوني الدولي للمناطق المسجلة ضمن لائحة التراث العالمي
...Show More Authors

يعكس التراث هوية الأفراد والمجتمعات ليس فقط لكونه امتداد الماضي إلى الحاضر بل لأنه يمثل مردودا اقتصاديا واجتماعيا وسياسيا فاعلا في المجتمعات الحاضرة وهو ما أدى إلى اهتمام دولي ووطني كبير بضرورة حمايته لذلك في هذه الأطروحة يتناول الباحث موضوع التنظيم القانوني الدولي للمناطق المسجلة ضمن لائحة التراث العالمي دراسة حالة العراق وفي إطار تعميق الفهم بالتراث العالمي تناولت الباحثة التعريف بالتراث العالمي الذي ي

... Show More
Publication Date
Sat Oct 31 2020
Journal Name
مجلة حمورابي
التطرف و الإرهاب الإلكتروني- و موقف القانون الدولي منهما
...Show More Authors

شكلت التطورات التكنولوجية في وسائل التواصل الاجتماعي الناجمة عن العولمة معلم رئيسي في تحولات التنظيمات الإرهابية، وإنتاج انماط جديدة من الإرهابيين والمتطرفين القادرين على التفاعل مع الثورة المعلوماتية والاتصالية. ان معظم الجرائم الإرهابية الإلكترونية مرتبطة بالإنترنت وهو المسرح المفضل للمتطرفين فالأول يقتل والثاني يسوغ ويحرض ويجند، والذي جعل الإنترنت وسيلة فعالة كونها سهلة الاستخدام وسريعة الوصول إلى

... Show More
View Publication
Publication Date
Sun Jan 02 2005
Journal Name
Political Sciences Journal
عرض اطروحة (الحركات الاسلامية في ظل الوضع الدولي الجديد)
...Show More Authors

الحركات الاسلامية في ظل الوضع الدولي الجديد

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 31 2022
Journal Name
جامعة بغداد مركز الدراسات الدولية
الحكم في أفغانستان بين المصالح و القانون الدولي الإنساني
...Show More Authors

كان لسياسات االحتالل دور بارز في فشل مشروع إعادة بناء الدولة في افغانستان، وفي الوقت نفسه تتحمل دول االحتالل المسؤ و لية الكاملة عن بعض هذه ً كبي ارً السياسات مثل عدم التخطيط الجيد لمرحلة االحتالل وإعادة بناء الدول ة، ثم إن جزءا من فشل هذه السياسات يرجع الى البيئتين المحلية واإلقليمية ، كذلك كان للخبرة السياسية والدستورية وللواقع االجتماعي الثقافي األفغاني تأثيرهما المهم في قدرة المجتمع األفغاني ً على قبول

... Show More
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (5)
Scopus
Publication Date
Sat Jul 01 2000
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A NEW SPECIES OF LIODONTOMERUS GAH. FROM IRAQ (HYMENOPTERA, TORYMIDAE)
...Show More Authors

A study of the Torymid collection of Iraq. resulted in undescribed species of the genus
Liodontonierus Gah. L. longicorpus sp. n. with 2 figures.

View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref