Preferred Language
Articles
/
AhilbpYBVTCNdQwCAYQi
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak of the Russian-Ukrainian war, which affected food supply chains and was important for wheat. The Gaza war caused consequent repercussions on energy crossings and supplies in the Eastern Mediterranean and West Asia. Owing to these factors, there have been repercussions on regional and international hubs and blocs in the Middle East. Additionally, the continued US-Iranian escalation on controversial issues worsened the situation. The US- Iranian influence essentially imposed

View Publication
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Passive Design Strategies to Enhance Natural Ventilation in Buildings "Election of Passive Design Strategies to Achieve Natural Ventilation in Iraqi Urban Environment with Hot Arid Climate"
...Show More Authors

The natural ventilation in buildings is one of effective strategies for achieving energy efficiency in buildings by employing methods and ways of passive design, as well as its efficiency in providing high ranges of thermal comfort for occupants in buildings and raises their productivity. Because the concept of natural ventilation for many people confined to achieve through the windows and openings only, become necessary to provide this research to demonstrate the various passive design strategies for natural ventilation. Then, research problem: Insufficient knowledge about the importance and mechanism of the application of passive design strategies for natural ventilation in buildings. The research objective is: Analysis of passive desi

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 02 2014
Journal Name
International Journal Of Engineering Research And General Science
Security in Cloud Computing
...Show More Authors

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Investment in Human Resources According to the Requirements of Work Markets in Iraq
...Show More Authors

Investment in Human is one of the best and most important investments as it is renewed and developed resource over time in comparison with depleted material resources. Human resources is considered the part of the population that could be employed economically to contribute in increasing production energies as it is the support pillar of the society and have great energies that construct the society and raise of nations as well as he is distinguished with characteristics of ambitions to freedom.

Iraq is one of the countries that has large number of population in age of work and production and reduce in age dependent classes (children and old people).This dynamic in population led to step

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Application Effect of the Conflict Management Strategies On Increasing Workers Productivity at the Electricity Company (IGEC) (Field Study Irbid Governorate)
...Show More Authors

Research aimed to explore the Application Effect of the Conflict Management Strategies by the managements to solve conflict between and inside the conflicted parties within (IGEC) to increase the productivity of the workers. To collect data, 110 questioners had been distributed among managers and heads of departments of all managerial levels, 102 answered questioners regained, 5 of them were disqualify for statistical analytic, only 97 were taking in consideration   for statistical analysis presenting 93% of the retained number.

SPSS Program supported with a group of statistical tools, had been used for analysis purposes such as Kronbach Alpha test to assure the validity & stability of the t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 27 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Women’s Knowledge about Health Promotion after Cesarean Delivery at Maternity and Pediatric Hospital in Al-Samawa City
...Show More Authors

Objective(s): To assess women’s knowledge about health promotion after a cesarean delivery and to determine the association between women’s knowledge and their demographic data of age, level of education, and monthly income.
Methodology: A descriptive design is carried out to assess women’s knowledge about health promotion after cesarean delivery at Maternity and Pediatric Hospital in Al-Samawa City. This study starts from 26th of September 2020 up to 16th March 2021. Sample of (100) woman who are at reproductive age, pregnant (prime or multipara) who have planned to have birth by elective cesarean section or had previous elective caesarian section without medical indication or women who had cesarean section with medical indicat

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
identification of fungi and their toxins associated with imported rice grain to iraq
...Show More Authors

The study included the investigation of fungi ringed and inventory and Aflatoxins in rice and recorded average temperatures and humidity 22.75 degree Celsius and 13.2% respectively were obtained 1356 isolation innate possible diagnosis 15 species inherent in rice imported back to 8 races represented races b Fusarium , Cladosporium, Aspergillus and Alternaria

View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Al–bahith Al–a'alami
Stereotypical Frames if the Image of Women in the Iraqi TV Drama after 2003
...Show More Authors

This study aims to deliver the woman’s image and to unveil on how to be introduced in the TV series. The research is based on the survey method-using content analysis tool. The research sample represented in the TV series produced by the IMN, which were displayed in 2014 and used the pattern of Margaret Gallagher to analyze the content of the series in accordance with the frame analysis theory.
The study came up with declination of the woman’s representation compared with man in Iraqi TV drama, also the study finds that the series introduced the woman according to the personal, social, political, and economic frames in a standardizing method. It focuses on the characteristics always attributed to it as showing her obedient of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis
...Show More Authors

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Financial Variables and Their Effects on The Development of Bank Credit and Productive Sectors in Iraq Using a Path Analysis Model
...Show More Authors

This study aims to measure and analyze the direct and indirect effects of the financial variables, namely (public spending, public revenues, internal debt, and external debt), on the non-oil productive sectors with and without bank credit as an intermediate variable, using quarterly data for the period (2004Q1–2021Q4), converted using Eviews 12. To measure the objective of the study, the path analysis method was used using IBM SPSS-AMOS. The study concluded that the direct and indirect effects of financial variables have a weak role in directing bank credit towards the productive sectors in Iraq, which amounted to (0.18), as a result of market risks or unstable expectations in the economy. In addition to the weak credit ratings of borr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.