The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro
... Show MoreThe research aims to measure and analyze the reality of liquidity in the Rasheed Bank and determine their impact on risk and return in order to identify the extent of the efficiency of the management of liquidity by the Bank and how to employ them in a profitable investment areas, and analysis of the compatibility of the liquidity gap and gap the balance sheet (sensitive interest rate) and affected net interest Change prices, and through the adoption of style ladder recommended Meritassets and liabilities by the Central Bank of Iraq, as it is an important and vital aspects in commercial banks' management, when there is a commonly used optimizing the resources of the bank available, it means that there is a banking efficient management is
... Show MoreDue to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive data
from illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, we propose a design of a new sensor node for tracking the location of cars and collecting all information and all visited locations by cars, followed by
encryption in a sensor node and saving in the database. A microcontroller of Arduino es
The establishment of a high quality service in oral health care achieved by a member of dental professional is an important feature of any system of peer review in dentistry. This protocol attempts to discuss two crucial elements (I) suitability and feasibility of treatment modality and (II) quality of treatment performed to Iraqi patients. The Iraq endodontic society is designing a standardized protocol for endodontic treatment following the quality guidelines of European society of Endodontology (2006) to meet the highest standard of care generally given by competent practitioners. The Iraqi endodontic society has the expertise and professional responsibility clinically relevant to empower the dental profession through creating significan
... Show MoreThe main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show MoreIn this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.
In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.