Preferred Language
Articles
/
jcopolicy-89
The strategy of preventive war In US National Security Documents (2002-2006)
...Show More Authors

The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the Causal Relationship Long-and Short-term Between the Price of Crude Oil, the Global Price of Gold and the US. Dollar Exchange Rate
...Show More Authors

This research aims to test the causal relationship long-and short-run between the price of gold the global crude oil price and the exchange rate of the dollar and how you can take advantage of the nature of this relationship, particularly in the Arab oil states that achieve huge surpluses, including Iraq and how to keep on the purchasing power of these surpluses or reduce the levels of risk.

The problem is that the Arab oil countries, adversely affected, as a result of that relationship, due to the fact that its role confined to the sale of crude oil only. They do not have control in the dollar, then they are not able to take advantage of its impact on the price of gold the fact that gold is effective pr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Mon Jun 20 2022
Journal Name
Journal Of Positive School Psychology
The Role Of Product Lifecycle Cost Technology And Cleaner Production Strategy In Reducing Costs
...Show More Authors

Reducing costs and protecting the environment surrounding economic unity has become the concern of many economic units and shifting their ideas towards preserving resources and protecting the environment by adopting strategies and techniques that take into account when applied reducing production costs and protecting the environment, including these strategies and techniques, the technical costs of the product life cycle and the strategy of cleaner production, as the application of the two concepts in local economic units helps to try to keep up with the countries that work to keep up with the success of their economic units by following the concepts that have been successful in  Developed countries by maintaining the sustainabilit

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 13 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Strategic relationship training to promote self-growth of the individual
...Show More Authors

The main objective of the research is to identify the role of strategic training and its effect on enhancing the self-growth of the individual. Stratigic training represents a contemporary tendency. that is adopted by business organizations in carrying out their activities and tasks.

It is worth to mention, that self-growth of the individual is one of the indictors used to determine the ability of organization to a achieve its goals. 

The problem of the research has pointed out to the minimum awareness of the important role played by training strategy in enhancing the self-growth of the individual. The researcher has adopted an analytical approach, in collecting and analyses

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 12 2026
Journal Name
Journal Of Baghdad College Of Dentistry
An Oral Health Status and Treatment Needed in Relation to Dental Knowledge, Among a Group of Children Attending Preventive Department, College of Dentistry, University of Baghdad
...Show More Authors

Background: Oral health represents an important base for human well-being; the heath of the body begins from oral cavity. Great deal has been applied to increase knowledge in the field of oral health in order to develop appropriate preventive program. This study was conducted in order to estimate the percentage and severity of dental caries and gingivitis among children attending Preventive Department in Collage of Dentistry, University of Baghdad and to determine dental treatment need for those patients, further more to study the relation of these variables with dental knowledge. Materials and Methods: The study group consists of 163 children with an age ranged from 6 to 14 years, who attended the preventive clinic for the first time to be

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 03 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Prevalence of Hypochondriasis Disorder among Iraqi Former Prisoners of Iraq-Iran War, 1980-1988
...Show More Authors

Objective : To find out the prevalence of Hypochondriasis among Iraqi repatriated prisoners of
Iraq-Iran war, and the relationship with some variables.
Methodology: A descriptive study was carried out from Jan. 2nd , 2006 through May 4th , 2006. A
non-probability accidental sample of 400 repatriates who had visited; Ministry of Human Rights,
Ministry of Health, and Ministry of Defense. A questionnaire was constructed for this purpose, which
consisted of 6 items for demographic data, and 14 items for measuring Hypochondriasis. Reliability
and validity of the questionnaire had been determined through the pilot study (Test and retest) and the
experts panel. Data were collected with using the constructed questionnaire an

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 09 2021
Journal Name
Palarch’s Journal Of Archaeology Of Egypt/egyptology
The effect of Five-Finger strategy on the holistic thinking of chemistry student in the second intermediate grade
...Show More Authors

The objective of the research is to identify the effect of the five-finger strategy on the holistic thinking of chemistry students in the second intermediate grade, where the sample consisted of 60 female students in a second classfrom one of the intermediate schools in Baghdad city, divided into two groups: control and experimental. The experimental design was based on the partial control; the scientific course was defined in the third and fourth chapters of the science book of the second intermediate grade.The two research tools were prepared: the attainment test with the scientific course and the holistic thinking scale paragraph (36) of multiple-choice pre- and posttest. The results showed a statistically significant difference between

... Show More
Publication Date
Sat Feb 29 2020
Journal Name
Utopía Y Praxis Latinoamericana
The Impact of Fishbone Strategy in the Achievement of Chemistry and Visual Thinking Among the Seven Grade Students
...Show More Authors

e current research aims to know the effect of fishbone strategy on achievement of chemistry and visual thinking among middle school students, the research sample consisted of 89 students divided into two experimental groups consisting of 44 students who studied fishbone strategy, and a control group that consisted of 45. A student studied in the usual way; the two groups were rewarded in a number of variables, and the researcher built two tools for the research: the first is an achievement test consisting in 30 paragraphs, and the second is a visual thinking test consisting in 18 paragraphs. Keywords: Chemistry, fishbone, seven grade, students, visual thinking..

Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.