Preferred Language
Articles
/
jcopolicy-89
The strategy of preventive war In US National Security Documents (2002-2006)
...Show More Authors

The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
مجلة التربية الرياضية
The Administrative Flexibility of The Iraqi National Olympic Committee from Administrative Bureau Members’ point Of View in Sport Federations
...Show More Authors

Publication Date
Fri Apr 16 2021
Journal Name
Pharmaceutical Medicine
The Epidemic of Substandard and Falsified Medications in Iraq: Evaluating the Effectiveness of National Pharmacovigilance Alerts to Community Pharmacies
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
Iraqi national identity: the past and the present crises .. The causes and treatments
...Show More Authors

لخلاصة تشغل قضايا الهوية محور اهتمام الكثير من الباحثين والدارسين في بنية المجتمعات ومستقبل الدول, وفي كثير من الدراسات التي كتبها هؤلاء كان هناك ميل نحو دراسة الهوية وعلاقتها بحركة الدول تقدما وتراجعا ,فهناك من عزا تقدم دولة ما إلى نجاح نخبها السياسية في صناعة هوية جامعة لحالة التنوع الذي يميز مجتمعها, ويمكن ان تشير الى الولايات المتحدة الامريكية كأنموذج للنجاح في هذا الاطار.وهناك من ارجع

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
South Asian Journal Of Social Sciences And Humanities
The Impact of the Sustainable Strategy on Strategic Performance: Field Study in the Iraqi Tourism Sector
...Show More Authors

The tourism industry, with its two sides (recreational and religious), is one of the important investment fields in Iraq, it is represented Iraq as the second economic source after the oil sector. So a need for serious efforts to develop the tourism sector and maintain its sustainability. This paper will be one of the important contributions in this field; the paper aims to explore the extent of the impact of the sustainable strategy on the level of overall performance in the Iraqi tourism sector. The field of research was some Iraqi tourist institutions at Iraqi tourism, Which covers the field of study on the one side, and can be studied on the other side, for the developing study methodology and organizing its main parts, the research pap

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
The Impact of the Constructive Scientific Stations Strategy on Achievement and Mind Habits for The Fourth Scientific students in biology
...Show More Authors

The study aimed at ideutifying the impact of scieutific skills in strategy and liabits of mind amony stueuts in tenth grade . The study demanded to choose a sampie that coutaiun (42) student of the fourth grade of the secondary school who were dirided into tow groups , the first is experimental studied according to scieutific skill strategy , and the other controlling , studied according to the  usualway . An achievement test  has been taken that adopted  staudard for mind skills as research tools that are applid after ascertaining  sincerity proved at the end of the experiment .The study has reached to the conclusion that there are statistically significant differnces in farour of the experiment group in both

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Proposed Method For Web Services Security
...Show More Authors

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose &n

... Show More
View Publication Preview PDF