Preferred Language
Articles
/
jcopolicy-89
The strategy of preventive war In US National Security Documents (2002-2006)
...Show More Authors

The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 13 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 07 2018
Journal Name
Oral And Maxillofacial Surgery
Mandibular war injuries caused by bullets and shell fragments: a comparative study
...Show More Authors

View Publication
Scopus (5)
Crossref (8)
Scopus Crossref
Publication Date
Tue Aug 07 2018
Journal Name
Oral And Maxillofacial Surgery
Mandibular war injuries caused by bullets and shell fragments: a comparative study
...Show More Authors

View Publication
Scopus (5)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Sat Jan 01 2022
Journal Name
Bild Law Journal
Law and its influential role for strategic leadership in managing security crises in Iraq
...Show More Authors

Scopus
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Improving the efficiency and security of passport control processes at airports by using the R-CNN object detection model
...Show More Authors

The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Auditing the technical reserves of the aircraft body insurance branch and its reflection on the fairness of the financial statements : applied research in the National Insurance Company
...Show More Authors

The research gained its importance from the importance of technical reserves in the insurance activity and its impact on the result of the activity of insurance companies and their financial position and thus reflected on the insurance prices as the technical reserves are one of the most important and most valuable budget items usually, as well as that the insurance activity has a role in maintaining economic development where some countries develop laws and instructions for the formation of those reserves binding application to insurance companies and the fact that the financial statements in general are of interest to shareholders, banks, the General Tax Authority and other beneficiaries In the insurance activity as policyholders and t

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 09 2021
Journal Name
Palarch’s Journal Of Archaeology Of Egypt/egyptology
The effect of Five-Finger strategy on the holistic thinking of chemistry student in the second intermediate grade
...Show More Authors

The objective of the research is to identify the effect of the five-finger strategy on the holistic thinking of chemistry students in the second intermediate grade, where the sample consisted of 60 female students in a second classfrom one of the intermediate schools in Baghdad city, divided into two groups: control and experimental. The experimental design was based on the partial control; the scientific course was defined in the third and fourth chapters of the science book of the second intermediate grade.The two research tools were prepared: the attainment test with the scientific course and the holistic thinking scale paragraph (36) of multiple-choice pre- and posttest. The results showed a statistically significant difference between

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Materials Today: Proceedings
The influence of water-gypsum ratio on the properties of national gypsum (Jοss) for various additives
...Show More Authors

View Publication
Scopus (13)
Crossref (8)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Employ of Public Relations in Building Awareness of Security against Terrorism A Survey of the Employees of the Directorate General of Public Relations and Media at the Ministry of Interior
...Show More Authors

This study aims at identifying the role played by Public Relations in the field of security awareness of the dangers of terrorism. The research is directed to the employees at the Directorate General of Public Relations and Media at the Ministry of Interior. And that on the basis that those who play an important role in the security awareness are the security institutions, primarily the Ministry of Interior, since this Directorate is responsible for all subjects related to the public security using public relations science. It aims at identifying the functions, methods and communication tools used by the Directorate to raise awareness about the dangers of terrorism. In order to achieve the research objectives, the researcher uses the sur

... Show More
View Publication Preview PDF
Crossref