Preferred Language
Articles
/
jcopolicy-89
The strategy of preventive war In US National Security Documents (2002-2006)
...Show More Authors

The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The effectiveness of the harvesting strategy in the collection of environmental art by the Institute of Fine Arts students
...Show More Authors

 The current research aims to: (know the effectiveness of the harvesting strategy in the achievement of the students of the Institute of Fine Arts in environmental art.
- In order to know this effectiveness, the researcher put a main zero hypothesis and derived six sub-hypotheses from it. the usual way; As the research community reached (120) male and female students of the Fine Arts Institutes for the morning study in Baghdad. As for the research sample, it was chosen by the simple random method, and the number was (75) male and female students for the year 2021-2022 AD. The researcher applied a pre-knowledge test for the four groups of research to find out the level of previous experiences of students in the subject of environmen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
Shape of Round house as an Effective Strategy in the Collection of Art Education Students
...Show More Authors

The two researchers selected the problem of research which represented with the following asking: Does the use of the shape of Round house strategy have effectiveness in the collection of students of the Department of Art Education of the subjectof teaching methods?
The research aims to "measure the effectiveness of Strategy shape of Round house in the collection of students of the Department of Art Education for the material teaching methods" and to verify the aim of the research two zeroassumptions was identified to measure the level of achievement in the subject of teaching methods of third stage students in the Department of Art Education –College of Fine Arts.
The research community included the students of Art Education Dep

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 18 2022
Journal Name
Journal Of Interdisciplinary Mathematics
The dynamics of Coronavirus pandemic disease model in the existence of a curfew strategy
...Show More Authors

View Publication
Scopus (11)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The relationship between the dimensions of the strategic recovery and achieving the company's strategic goals: Applied research in the National Insurance Company
...Show More Authors

The aim of the research is to explain the nature of the relationship between the dimensions of the strategic recovery of the service represented by (compensation, speed of response, apology, initiative (defining the problem) and the strategic goals of the company represented in (profitability, growth, community service, employee satisfaction) in the National Insurance Company, it has been approved The questionnaire as a tool to collect data and information from the sample of (58) who are in (department manager, M. department director, division official, unit official) and the statistical program (spss) was used in calculating (arithmetic mean, standard deviation, coefficient of variation, coefficient of Correlation, t-test, varia

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 09 2025
Journal Name
Al–bahith Al–a'alami
The Semiology of Narrative Construction in Television Advertising to an Announce "God Will not Forget us" about the Covid-19 Pandemic for Zain Mobile Telecommunication Company
...Show More Authors

This research paper tries to show the significance of the narrative structure in the television advertisement and its connotations. The researchers chose the annual advertisement of Zain Mobile Telecommunication Company for the year 2020, which shed light on the global Corona pandemic crisis. The idea of the advertisement won wide approval as it focused on the suffering that everyone is witnessing like medical and security personnel in particular, and family relationships consequences.
In addition to the positive global interaction with the message presented by the Company in these exceptional circumstances. The advertisement, which lasted for 2.35 minutes, exceeded 13 million views in a short period of time. This prompted us to choos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Al-utroha L Sports Scinece
Standard levels for measuring the administrative work of sport unions in the Iraqi national union Olympic Committee
...Show More Authors

The sports institutions in general are affected and contact with sport in particular the environmental factor, whether political or economic, which makes them in constant need to consider their administrative applications to increase the confidence of their employees because of their suitability or consistency with the new reality according to the sports activities that relate to it, The stalemate in administrative and technical aspects of the administrative work method in the majority of the Olympic sports federations makes the achievement of most of the goals far from the present reality, and the selection of suitable alternatives to achieve the objectives by those who disagree with the concepts of modern dictatorial standards It leads to

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF