Preferred Language
Articles
/
jols-485
Autonomous state security
...Show More Authors

The state, as one of the most important social institutions that works to provide services and security for individuals, needs security, and this security is achieved according to a specific hierarchy that starts from the security of the individual and the security of society to the security of the state, as the advanced state security is based on the basic pillars of solidarity and social peace This security consists of several levels (human, regional, social, economic, and cyber), unlike Arab criminal legislation, including Iraqi law, which is based on the concept of traditional state security, as it relies on the military side only in order to provide maximum criminal protection for the security of the political system The security of the government, and this was the result of the ideological influence of the authoritarian political regime on the criminal law before 2003, which aimed to reduce the security of the state to the security of the political system and the security of the government.

      After 2003, the political system shifted from an authoritarian regime to a democratic one, but this transformation did not remove the deliberate confusion between crimes against the security of the state and crimes against the security of the political system and the government, although crimes against the security of the state are distinguished from crimes against the security of the system.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protec

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 15 2021
Journal Name
مجلة العلوم القانونية والسياسية
الحماية الجنائية لأمن الدولة الداخلي في ظل حروب الجيل الرابع
...Show More Authors

تناول البحث موضوعاً شديد الأهمية وهو الأمن الاجتماعي منظور اليه في سياق الحماية الجنائية لأمن الدولة والتحديات التي يتعرض لها بعد حصول تغيير حاسم في أساليب الحرب. كما يقدم البحث تقسيماً مختلفاً لأجيال الحروب نقتصر على اربعة منها استناداً إلى التغيير في أهداف الحرب الاستراتيجية وليس إلى مجرد وسائل ارتكابها لان هذه الوسائل لا تصلح لوصف التغييرات الحقيقية في أنماط الحروب والاهداف التي تسعى إلى تحقيقها. ويؤكد

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Role of Association of Southeast Asian Nations (Asean) in Achieving Regional Security
...Show More Authors

The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of ​​regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve inte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Steady State Simulation of Atmospheric Crude Distillation Tower
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
The Journal Of Physical Chemistry A
Excited-State Aromaticity Reversals in Naphthalene and Anthracene
...Show More Authors

Aromaticity reversals between the electronic ground (S0) and low-lying singlet (S1, S2) and triplet (T1, T2, T3) states of naphthalene and anthracene are investigated by calculating the respective off-nucleus isotropic magnetic shielding distributions using complete-active-space self-consistent field (CASSCF) wavefunctions involving gauge-including atomic orbitals (GIAOs). The shielding distributions around the aromatic S0, antiaromatic S1 (1Lb), and aromatic S2 (1La) states in naphthalene are found to resemble the outcomes of fusing together the respective S0, S1, and S2 shielding distributions of two benzene rings. In anthracene, 1La is lower in energy than 1Lb, and as a result, the S1 state becomes aromatic, and the S2 state becomes anti

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Feb 04 2020
Journal Name
College Of Islamic Sciences
The Seljuk Rum State in  Asia Minor and the Mongol Invasion 634 - 708 AH / 1236 - 1308 AD
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
And after:
      The research dealt with an important and critical era in the history of the Seljuk State of the Romans in Asia Minor, as that country, after the assumption of Sultan Ghiath al-Din Kehsaru II in the year 634 AH / 1236 CE, was subjected to the constant Mongol threat, so the research came marked with (the Seljuk State of Rome in Asia Minor and the Mongol invasion 634 - 708 AH / 1236 - 1308 AD) The research showed the succession of the Seljuk Sultans to the rulers whose rule after the death of Sultan Alaeddin Kikbad was weak and subject to the authority of the Mongols

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Sun Jan 01 2012
Journal Name
Political Sciences Journal
دور الحكومات في بناء الدولة ضمن اطار الدستور
...Show More Authors

دور الحكومات في بناء الدولة ضمن اطار الدستور

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Political Sciences Journal
قراءة في تأسيس الدولة العراقية 1921 الاهداف والنتائج
...Show More Authors

قراءة في تأسيس الدولة العراقية 1921 الاهداف والنتائج

View Publication Preview PDF
Crossref