Preferred Language
Articles
/
jcopolicy-89
The strategy of preventive war In US National Security Documents (2002-2006)
...Show More Authors

The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 20 2022
Journal Name
Journal Of Positive School Psychology
The Role Of Product Lifecycle Cost Technology And Cleaner Production Strategy In Reducing Costs
...Show More Authors

Reducing costs and protecting the environment surrounding economic unity has become the concern of many economic units and shifting their ideas towards preserving resources and protecting the environment by adopting strategies and techniques that take into account when applied reducing production costs and protecting the environment, including these strategies and techniques, the technical costs of the product life cycle and the strategy of cleaner production, as the application of the two concepts in local economic units helps to try to keep up with the countries that work to keep up with the success of their economic units by following the concepts that have been successful in  Developed countries by maintaining the sustainabilit

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2007
Journal Name
Political Sciences Journal
التطورات السياسية في افريقيا جنوب الصحراء بعد الحرب الباردة
...Show More Authors

التطورات السياسية في افريقيا جنوب الصحراء بعد الحرب الباردة

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 17 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Oral Health Status and Treatment Needed in Relation to Dental Knowledge, Among a Group of Children Attending Preventive Department, College of Dentistry, University of Baghdad
...Show More Authors

Background: Oral health represents an important base for human well-being; the heath of the body begins from oral cavity. Great deal has been applied to increase knowledge in the field of oral health in order to develop appropriate preventive program. This study was conducted in order to estimate the percentage and severity of dental caries and gingivitis among children attending Preventive Department in Collage of Dentistry, University of Baghdad and to determine dental treatment need for those patients, further more to study the relation of these variables with dental knowledge. Materials and Methods: The study group consists of 163 children with an age ranged from 6 to 14 years, who attended the preventive clinic for the first time to be

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2007
Journal Name
Political Sciences Journal
قراءة عراقية للتقرير الامريكي (بيكر - هاملتون + التقرير الاصلي)
...Show More Authors

قراءة عراقية للتقرير الامريكي (بيكر - هاملتون + التقرير الاصلي)

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Fri Dec 01 2023
Journal Name
مجلة بحوث الشرق الأوسط
موقف الهند من الحرب الروسية الأوكرانية 2022
...Show More Authors

اتخذت الهند موقفاً محايداً من الحرب الروسية الأوكرانية، لما له من أبعاد سياسية واقتصادية وعسكرية مع أطراف الصراع في الحرب، وقناعتها بعدم قدرتها على التأثير فيها. فهي تربطها علاقات استراتيجية تاريخية مع روسيا، الداعمة لها سياسياً في مجلس الأمن والوسيط ضد خصومها الصين وباكستان. لذلك الهند مقتنعة بأن أوكرانيا تُعدّ مجالاً للنفوذ الروسي الذي عمل حلف شمال الأطلسي على التوسع به رغم التحذيرات الروسية. لذا أيقنت ا

... Show More
Publication Date
Tue Feb 09 2021
Journal Name
Palarch’s Journal Of Archaeology Of Egypt/egyptology
The effect of Five-Finger strategy on the holistic thinking of chemistry student in the second intermediate grade
...Show More Authors

The objective of the research is to identify the effect of the five-finger strategy on the holistic thinking of chemistry students in the second intermediate grade, where the sample consisted of 60 female students in a second classfrom one of the intermediate schools in Baghdad city, divided into two groups: control and experimental. The experimental design was based on the partial control; the scientific course was defined in the third and fourth chapters of the science book of the second intermediate grade.The two research tools were prepared: the attainment test with the scientific course and the holistic thinking scale paragraph (36) of multiple-choice pre- and posttest. The results showed a statistically significant difference between

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Bild Law Journal
Law and its influential role for strategic leadership in managing security crises in Iraq
...Show More Authors

Scopus
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (2)
Crossref