Preferred Language
Articles
/
jeasiq-2120
Enhancing national security through foreseeing the economic intelligence system in Iraq
...Show More Authors

 

         Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the possibility of exploring future possibilities

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 06 2014
Journal Name
Journal Of Educational And Psychological Researches
اثر برنامج أنشطة مكتبية لتنمية بعض القدرات الإبداعية في الأداء اللغوي عند اطفال الرياض
...Show More Authors

This study aims to find out the impact of activities office provided to kindergarten children in the development of creativity in linguistic performance goal of capabilities (fluency, flexibility and originality) through the application of the test configuration Algheih Children Riyadh, which consists of (70) Single to measure the skills of language arts four a listening and speaking and a willingness to read and prepare for writing, was applied (30) Single of language arts, listening and speaking in this research, and was the correlation coefficient for the hearing (0.78) and for speaking was (0.61) has been extracted stability of the scale using the equation Alvakronbach the value of (0.73).

The proper

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 22 2018
Journal Name
Arab Science Heritage Journal
اخبار أخبار الزمان في تاريخ بني العباس للخزرجي (ت812هـ) دراسة وتحقيق العصر العباسي الأول
...Show More Authors

تحيا الأمم بتراثها فهو الأساس الذي تنطلق منهُ، وما من أمة إلاّ ولها تراث، وهو سر حياتها وديمومتها ، فالأمة العربية الأسلامية لها تراث تليد التي تشرفت بحمل أقدس رسالة سماوية وأكملها لأمم الأرض، فكانت نبراساً أهتدت به البشرية حتى انتشلتها من واقعها المريض إلى أرغد عيش وأقوم خلق وأنبل نفس .

View Publication Preview PDF
Publication Date
Wed Dec 20 2023
Journal Name
Arab Science Heritage Journal
بعض وظائف النبي صلى هللا تعالى عليه وآله وصحبه وسلم الواردة في القرآن الكريم
...Show More Authors

The research included an introduction, and three functions
of the Prophet (peace and blessings of Allaah be upon him), a
machine and a companion, and a conclusion , the first function,
which is zakaah, and began with it because it is the basis of every
work, no work is accepted by Allaah except what was sincere to
him, as well as sincere intention, because accepting works is
entrusted with the

View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Educational And Psychological Researches
المناخ المدرسي وعلاقته بالتكيف الاجتماعي لدى تلاميذ الصف الاول الابتدائي في محافظة اربيل/ المركز
...Show More Authors

The research aims at defining the level of the school environment and the social adjustment of the sample due to the sex and the relation among them. The two researchers have stated the school environment scale counting on the theoretical background and previous studies. As for the social adjustment scale, the researchers have used the scale of (Al-Kindy, 2001) and the school environment scale is implicated on (112) students. The schools and the students were elected in a random way. Whereas the social adjustment scale is implicated on (30) teachers in order to know their ratio of the student's adjustment. The results have appeared the satisfaction of the students on the private school environment within their school aspects (the directo

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Laminar Natural Convection of Newtonian and Non – Newtonian Fluids Inside Triangular Enclosure
...Show More Authors

In the present work, steady two – dimensional laminar natural convection heat transfer of Newtonian and non-Newtonian fluids inside isosceles triangular enclosure has been analyzed numerically for a wide range of the modified Rayleigh numbers of (103Ra ≤ 105), with non-dimensional parameter (NE) of Prandtl – Eyring model ranging from (0 to 10), and modified Prandtl number take in the range (Pr* =1,10, and 100). Two types of boundary conditions have been considered. The first, when the inclined walls are heated with different uniform temperatures and the lower wall is insulated. The second, when the bottom wall is heated by applying a uniform heat flux while the inclined walls at

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
استهداف السعر كأساس لتحقيق تقنية التكلفة المستهدفة للوحدات الاقتصادية العاملة في بيئة الأعمال الحديثة
...Show More Authors

المقدمة

تمثل الأسعار تعبيرا" نقدياً لقيمة السلع والخدمات المقدمة للزبون، وتعد عملية التسعير من العمليات المهمة وذات الأثر البالغ على نجاح واستمرار منظمات الأعمال، نظراً لما لها من تأثير على المقدرة الربحية وإعادة توزيع الدخل القومي المخصص للاستهلاك، إذ أنه بتحديد الأسعار يستطيع الفرد أن يوزع دخله بين ما يعده ضرورياً من السلع وما يعد كمالياً.

وعموماً فإن لعملية التسعير م

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (8)
Scopus Clarivate Crossref