Preferred Language
Articles
/
BhjIbpYBVTCNdQwC2ISn
Strategies of Israeli National Security towards Syrian Border Cities after 2011 (Quneitra, Swayda, and Daraa)
...Show More Authors

Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. Meanwhile, sociopolitical values in Israeli society have undergone several changes since 2011, not to mention the continuing conflict with the Palestinians. This study, therefore, aims to elaborate on the concept of national security, differentiate national security from similar concepts, and identify the threats to Israel's national security, represented by challenges arising from actions without states in the Syrian border areas, namely Quneitra, Suwayda and Daraa. Also, this study demystifies the aspects of Israel's strategies to address these challenges after 2011. Thus, this study draws on three key border cities, Quneitra, Swayda, and Daraa, which are vital parts of Syria.

View Publication
Publication Date
Thu Jun 07 2012
Journal Name
Scientific Research And Essays
Security verification of the return routability protocol by Murphi
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Wed Apr 30 2025
Journal Name
مجلة دراسات دولية
China-Russia relations after 2013: motives and determinants
...Show More Authors

This research aims to identify the reality of Sino-Russian relations after 2013, and to study the most important motives and determinants that affected the nature of these relations. The research was based on the criterion of national interest in interpreting and understanding relations between China and Russia, on the basis that national interest is what determines the state of cooperation and dependence, or the state of competition and difference. The research was based on the hypothesis that Sino-Russian relations after 2013 witnessed many factors and variables, some of which represented motives for strengthening relations between the two countries, and others represented obstacles that limit the level of cooperation and interaction betw

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Results In Engineering
Advances in Piezoelectric Energy Harvesting: Materials, Configurations, and Power Optimisation Strategies
...Show More Authors

View Publication
Crossref
Publication Date
Fri Mar 12 2021
Journal Name
Medico Legal Update
Knowledge, Awareness and Attitude of Pharmacy Students towards Epilepsy in Iraq
...Show More Authors

Background: The undergraduate students in pharmacy colleges represent a well-educated group of thecommunity according to the use of drugs and they are required to hold the appropriate knowledge of druguse and have positive attitudes toward health problems, this good knowledge about the diseases and theirtreatment will give good pharmacists in the future and this will reflect positively on patient knowledge, andtheir compliance with treatment, this due to direct contact of pharmacists with the patients.Aim: To know the knowledge, Awareness and Attitude of a sample of Iraqi pharmacy students towardsepilepsy.Method: Cross-sectional study used a structured questionnaire validated by previous studies to collectdata about knowledge, Aware

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Astrophysics And Space Science
The compound stream event of March 20-25, 2011 as measured by the STEREO B spacecraft
...Show More Authors
Abstract<p>The interaction of interplanetary coronal mass ejections (ICME) with each other and with co-rotating interaction regions (CIR) changes their configuration, dynamics, magnetic field and plasma characteristics and can make space weather forecasting difficult. During the period of March 20–25, 2011, the Solar Terrestrial Relation Observatory (<italic>STEREO</italic> B) encountered a compound stream containing several interacting structures. Our analysis suggests that the stream consists of two ICMEs followed by an embedded ICME/CIR. The sudden appearance of the third ICME within the fast wind side of the CIR causes the proton temperature(<inline-formula><alternatives><tex-math></tex-math></alternatives></inline-formula></p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
SURVEYS MEASUREMENT OF PUBLIC OPINION BETWEEN THEORY AND PRACTICE
...Show More Authors

The majority of statisticians, if not most of them, are primarily concerned with the theoretical aspects of their field of work rather than their application to the practical aspects. Its importance as well as its direct impact on the development of various sciences. Although the theoretical aspect is the first and decisive basis in determining the degree of accuracy of any research work, we always emphasize the importance of the applied aspects that are clear to everyone, as well as its direct impact on the development of different sciences. The measurements of public opinion is one of the most important aspects of the application of statistics, which has taken today, a global resonance and has become a global language that everyone can

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Life Management Strategies among Mosul University Academics
...Show More Authors

The study aims to measure life management (in its various approaches) among   university academics and to identify the differences among life management strategies (in its various approaches) in regard of gender (male, female), field of education (scientific, humanitarian) and title (assistant lecturer, lecturer, assistant professor, and professor). The study sample consisted of (246) male and female academics from four colleges (Arts, Science, Science education, and Humanitarian Science Education). To achieve the goals of the study, the researchers used the Freund & Baltes (2002) life-management strategies scale after translating it and determining its parameters of reliability and validity. The statistical analysis of the

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Editorial: Current advances in anti-infective strategies
...Show More Authors

Infectious diseases pose a global challenge, necessitating an exploration of novel methodologies for diagnostics and treatments. Since the onset of the most recent pandemic, COVID-19, which was initially identified as a worldwide health crisis, numerous countries experienced profound disruptions in their healthcare systems. To combat the spread of the COVID-19 pandemic, governments across the globe have mobilized significant efforts and resources to develop treatments and vaccines. Researchers have put forth a multitude of approaches for COVID-19 detection, treatment protocols, and vaccine development, including groundbreaking mRNA technology, among others.

This matter represents not only a scientific endeavor but also an essenti

... Show More
View Publication Preview PDF