Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and international issues and positions, as well as the collapse of political infrastructure and the emergence of many challenges that threaten Iraqi societal security and civil peace.
Research in the field of English language as a foreign language (EFL) has been consistently highlighted the need for communicative competence skills among students. Accompanied by the validated positive impact of technologies on students’ skills’, this study aims to explore the strategies used by EFL students in enhancing their communicative competence using digital platforms and identify the factors of developing communicative competence using digital platforms (linguistic factors, environmental factors, psychological factors, and university-related factors). The mixed-method research design was utilized to obtain data from Iraqi undergraduate EFL students. The study was conducted in the Iraqi University in Baghdad Iraq. EFL undergradu
... Show Moreلكل دولة في هذا العالم خطابها السياسي والذي يحدد سياستها الداخلية والخارجية، وهي سياسة ثابتة تنطلق من مفاهيم وبرامج وثوابت تخدم مصالحها الحيوية، لكون الخطاب السياسي ليس مجرد كلام عابر في عالم السياسة الدولية وانما هو ثوابت مهمة يحدد توجهات هذه الدولة او تلك ويحدد دورها الدولي وطبيعة العلاقة مع البلدان الاخرى ومنها الدول المجاورة لها. شهد العراق بعد العام 2003 تحديات جديدة تمثلت بتغليب خطابات الطائفية والكراه
... Show Moreلكل دولة في هذا العالم خطابها السياسي والذي يحدد سياستها الداخلية والخارجية، وهي سياسة ثابتة تنطلق من مفاهيم وبرامج وثوابت تخدم مصالحها الحيوية، لكون الخطاب السياسي ليس مجرد كلام عابر في عالم السياسة الدولية وانما هو ثوابت مهمة يحدد توجهات هذه الدولة او تلك ويحدد دورها الدولي وطبيعة العلاقة مع البلدان الاخرى ومنها الدول المجاورة لها. شهد العراق بعد العام 2003 تحديات جديدة تمثلت بتغليب خطابات الطائفية والكراه
... Show Moreالثقافة هي النظرية حول العالم والناسواساليب توزيع خبراته عليهم . انها الكل المعقد والتي تشمل المعرفةوالمعتقدات والفن والاخلاق والقوانين والعادات واية امكانيات وعادات يكتسبها الانسان كونه احد اعضاء المجتمع . ان ادراك ثقافة اللغة الاجنبية ينبغي ان يُنظرلها كمكونمهم في عملية تعليم / تعلم اللغة الانكليزية بوصفها لغةاجنبية وتتضمن الثقافة فهم داخلي وتدريجي للمساواة بين الثقافات ، ومنهن متزايد لثقافة الفرد
... Show MoreThe study aims at elicitation the morals strategies from sunnah depending on the analytic-qualitative method. It revealed a comprehensive integrated system of creative strategies to improve morals. It was categorized into three areas: cognitive strategies, affective strategies, and some strategies based on self-initiative and practice. The researcher recommended that teachers and educators should employ these effective strategies in the process of moral guidance for the Muslim generation. He also recommended that researchers should put more effort to do more In-depth qualitative studies, which must be directed to establish the origin of different education strategies from the Holy Qur’an, the Sunnah, and Muslim scholars’ legacy.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreThe characters of facades' form of the Iraqi building after 2003 have been changed, it has been described by many names. The problem of the research is that what are the features of the characters of the form in the façades of the buildings in Baghdad city after 2003? Are the façade of the individual houses or the commercial buildings is the heaviest in the visual weight? The research aims to answer those questions by choosing the vernacular architecture as a measurement tool. It is the informal image of the architecture, which is built by people informally and spontaneously, without official control and legislation to be organized. This is smellier to what has happened in Baghdad, after 2003 according to previous stud
... Show More