Preferred Language
Articles
/
pxiuz5QBVTCNdQwCFSDJ
The security problem in the Gulf Cooperation Council countries Study on internal challenges and future prospects
...Show More Authors

The importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing international and regional powers to preserve their interests and ensure the achievement of their objectives. This has further complicated the internal security environment in the Gulf, especially the recent events represented by a package of measures taken by Saudi Arabia, the UAE and Bahrain. As well as Egypt against Qatar, have begun to reveal to us the depth and root of differences, the size of internal challenges and the weakness of the ability of the GCC countries to meet their obligations in laying the foundations of a joint security-defense system with the capacity to face these challenges collectively, Security challenges are therefore not only external regional or international, but internal with inter-GCC interface

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Effect of Transverse Internal Ribs on Shear Strength Evaluation of Hollow RC Beams
...Show More Authors

This paper is devoted to investigate experimentally and theoretically the structural behavior of reinforced concrete hollow beams which have internal transverse ribs under effect of shear. The number of the internal ribs is the major variable adopted in this research, while, the other variables are kept constant for all tested specimens. The experimental part includes poured and test of four (200x300x1200mm) beam specimens, three of these specimens were hollow with different locations of internal ribs and one of them was solid. The experimental results indicated that the shear strength are increased (33%) to (60%) for beams containing internal ribs in comparison with reference beam. Also, the change of beam state from ho

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 14 2023
Journal Name
Journal Of Big Data
A survey on deep learning tools dealing with data scarcity: definitions, challenges, solutions, tips, and applications
...Show More Authors
Abstract<p>Data scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for</p> ... Show More
View Publication Preview PDF
Scopus (379)
Crossref (387)
Scopus Clarivate Crossref
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Constructivism Theory in International Relations (Case Study on the War on Terrorism)
...Show More Authors

        The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation of internal control System in non-governmental organizations: Applied Research in the Iraqi National Olympic Committee
...Show More Authors

After 2003 Iraq witnessed a rapid development in the number and kind of non-governmental organizations in addition to the increase in their sources.A lot of obstacles and constraints hinder the development of the said organizations and one of the most important and prominent obstacles is their administrative and accounting structure that affect directly on the existence, continuity and survival of these organizations.This research discussed the concept the non-governmental organizations and reaching the assessment of internal control System in these organizations. Therefore, the researcher has assessed the internal control System applied National Olympic Committee of Iraq. The study showed vulnerabilities in the internal control the said

... Show More
View Publication
Crossref
Publication Date
Mon Feb 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using Classification of Brown risks in Evaluation of the internal control system: Application Research in Karbala University
...Show More Authors

Internal control system is a safety valve that preserves economic units assets and ensure the accuracy of financial data, as well as to obligation in the laws, regulations, administrative policies ,and improve the efficiency, effectiveness and economic of operation, so it has become imperative for these units attention to internal and developed control system The research problem in exposure the economic units when the exercise of their business to many of the risks to growth or hinder the achievement of its objectives and the risks (financial, operational, strategy, risk) and not it rely on risk Assessment according to modern scientific methods, as in Brown's risk Classification, Which led to the weakness of the internal control identif

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of Internal Control Activities and their Role in Administrative Decisions
...Show More Authors

The current research aims to verify the relationship and impact of internal control activities as an independent variable in its dimensions (efficiency, training, independence) in making administrative decisions as a responsive variable and its dimensions (identifying and diagnosing the problem, searching for alternatives, evaluating alternatives, choosing the appropriate alternative, implementing the decision, following up Decision and evaluation) in the Kirkuk Water Directorate, as well as to identify the levels of their practices, and then try to come up with a number of recommendations contribute to the strengthening of internal control activities and the process of making administrative decisions of the researched Directorat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Exploring the Challenges of Diagnosing Thyroid Disease with Imbalanced Data and Machine Learning: A Systematic Literature Review
...Show More Authors

Thyroid disease is a common disease affecting millions worldwide. Early diagnosis and treatment of thyroid disease can help prevent more serious complications and improve long-term health outcomes. However, thyroid disease diagnosis can be challenging due to its variable symptoms and limited diagnostic tests. By processing enormous amounts of data and seeing trends that may not be immediately evident to human doctors, Machine Learning (ML) algorithms may be capable of increasing the accuracy with which thyroid disease is diagnosed. This study seeks to discover the most recent ML-based and data-driven developments and strategies for diagnosing thyroid disease while considering the challenges associated with imbalanced data in thyroid dise

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref