Preferred Language
Articles
/
yhdaPo4BVTCNdQwCqz41
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Mon Jan 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Administrative decision-making strategies Concepts - theories factors affecting
...Show More Authors

Objective: To know the recent shifts in the decision-making process and theories and stages, techniques and systems affecting it.
      The need for research coming  because of the problems that accompany the decision as a result of the failure Sometimes, poor visualization or the narrow perspective of decision-making than miss the opportunity to choose alternatives or options of the most effective and appropriate to solve a problem.
      And has received exceptional decision-making process in administrative studies and research to enable the organization to continue its activities and its high efficiency, especially successful that the decision depends on the future,

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
Journal Of Engineering
Rigid trunk sewer deterioration prediction models using multiple discriminant and neural network models in Baghdad city, Iraq
...Show More Authors

The deterioration of buried sewers during their lifetime can be affected by several factors leading to bad performance and can damage the infrastructure similar to other engineering structures. The Hydraulic deterioration of the buried sewers caused by sewer blockages while the structural deterioration caused by sewer collapses due to sewer specifications and the surrounding soil characteristics and the groundwater level. The main objective of this research is to develop deterioration models, which are used to predict changes in sewer condition that can provide assessment tools for determining the serviceability of sewer networks in Baghdad city. Two deterioration models were developed and tested using statistical software SPSS, the

... Show More
Publication Date
Mon Jul 31 2017
Journal Name
Journal Of Engineering
Rigid Trunk Sewer Deterioration Prediction Models using Multiple Discriminant and Neural Network Models in Baghdad City, Iraq
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
The most prominent philosophical and rhetorical concepts in the perspective of philosophers and theologians
...Show More Authors

     This research aims to clarify and define the most important philosophical and rhetorical concepts to which many philosophical and rhetorical issues refer، since they have an effective role in the diversity and difference of intellectual schools، which are indispensable in proving major dogmatic issues، such as the concept of (existence، being، essence، and authenticity). Existence or Essence in contrast to the consideration of the other concept)، because it is one of the complex concepts and common words that carry different connotations among thinkers.

   And from (the rule of judging something is a branch of its perception)، the researchers began to define these concepts، as evidence of the sincerity of perce

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
نسق
Job security and its relationship to psychological tranquility in divorced teachers
...Show More Authors

A sense of job security for divorced female teachers is one of the basic and very important requirements for enjoying the mental health that a person needs in order to be positive, balanced and productive. job security is one of the important things that workers must feel not only to ensure interaction and harmony between them and officials, but to ensure their satisfaction and increasing their motivation towards work, as job security is one of the most important indicators of job satisfaction and optimism in life, and it leads to the experience of psychological reassurance, which affects the building of individuals' personalities, the development of their intellectual competence and the identification of their psychological characteristic

... Show More
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Mon May 01 2017
Journal Name
2017 24th International Conference On Telecommunications (ict)
Load balancing by dynamic BBU-RRH mapping in a self-optimised Cloud Radio Access Network
...Show More Authors

View Publication
Crossref (8)
Crossref