Preferred Language
Articles
/
jols-485
Autonomous state security
...Show More Authors

The state, as one of the most important social institutions that works to provide services and security for individuals, needs security, and this security is achieved according to a specific hierarchy that starts from the security of the individual and the security of society to the security of the state, as the advanced state security is based on the basic pillars of solidarity and social peace This security consists of several levels (human, regional, social, economic, and cyber), unlike Arab criminal legislation, including Iraqi law, which is based on the concept of traditional state security, as it relies on the military side only in order to provide maximum criminal protection for the security of the political system The security of the government, and this was the result of the ideological influence of the authoritarian political regime on the criminal law before 2003, which aimed to reduce the security of the state to the security of the political system and the security of the government.

      After 2003, the political system shifted from an authoritarian regime to a democratic one, but this transformation did not remove the deliberate confusion between crimes against the security of the state and crimes against the security of the political system and the government, although crimes against the security of the state are distinguished from crimes against the security of the system.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Security Intellectual Proposals of the Paris and the Wales Schools
...Show More Authors

The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties  of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2008
Journal Name
Journal Of Educational And Psychological Researches
الإذعان وعلاقته ببعض سمات الشخصية لدى موظفي الدولة
...Show More Authors

ان الجزء الاكبر من السلوك الاجتماعي تنظمه المعايير الاجتماعية التي من المتوقع ان يسلك الافراد وفقا لها ، وهكذا فأن الجماعات التي يوجد انسجام بين افرادها سرعان ما تكون اتجاهات وولاءات مشتركة لعدد اكبر من المواقف فعندما ينظم فرد الى جماعة فأن ادراكاته تتغير لتتوافق مع معايير تلك الجماعة .( توق وعدس ، د.ت، ص336).وتؤدي الاسرة دورا اساسيا في اكساب الفرد اتجاهات ومعايير خلقية معينة ثم تقوم الجماعات الثانوية الم

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The impact of political thinking on the decision maker in analyzing the strategic environment of the state (applied study in the Iraqi Ministry of Finance)
...Show More Authors

The Political Thinking Regarded as an important element for the formulation of the stat, weather in its formation, the structure of it s entity, its political system and it s governmental instruments .The political thinking can not act without determined strategy, So they intend to work hard to formulate a railed strategy that make them able to determine its  directions to general issues.

   The Study aimed to solve the problem through the following question:

1- What are the levels of Political Thinking and Strategic Analysis in the financial ministry?

2- What are the relation ship between the dimensions of Political  T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 18 2021
Journal Name
Iraqi Journal Of Science
Oxidative stress state during pregnancy period
...Show More Authors

The present study was designed to find the relation between oxidative stress and
pregnancy. The study used one hundred twenty volunteers (ninety pregnant women
and thirty non-pregnant women). Then pregnant women were divided to three
subgroups according to trimester (first trimester, second trimester and third
trimester). then, some oxidative stress factors (MDA, GSH, catalase and TAC) were
measurement. Biochemical tests showed significant (P<0.05) increase in
malonedialdehyied (MDA) and significant (P<0.05) decrease in Glutathione (GSH),
Catalase (CAT) and total antioxidant capacity (TAC) in pregnant women compared
with non-pregnant women group. It was concluded from this study that the
pregnancy led to

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Popular Mobilization and human security In Local Society
...Show More Authors

The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions,  Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.

View Publication Preview PDF
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Community organization and its impact On social security
...Show More Authors

The world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
Community organization and its impact on social security
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
       We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has

... Show More
View Publication Preview PDF
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Potential Energy Expectation Value for Lithium Excited State (1s2s3s)
...Show More Authors

The purpose of the present work is to calculate the expectation value of potential energy for different spin states (??? ? ???,??? ? ???) and compared it with spin states (??? , ??? ) for lithium excited state (1s2s3s) and Li- like ions (Be+,B+2) using Hartree-Fock wave function by partitioning techanique .The result of inter particle expectation value shows linear behaviour with atomic number and for each atom and ion the shows the trend ??? < ??? < ??? < ???

View Publication Preview PDF
Crossref