Preferred Language
Articles
/
BhjIbpYBVTCNdQwC2ISn
Strategies of Israeli National Security towards Syrian Border Cities after 2011 (Quneitra, Swayda, and Daraa)
...Show More Authors

Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. Meanwhile, sociopolitical values in Israeli society have undergone several changes since 2011, not to mention the continuing conflict with the Palestinians. This study, therefore, aims to elaborate on the concept of national security, differentiate national security from similar concepts, and identify the threats to Israel's national security, represented by challenges arising from actions without states in the Syrian border areas, namely Quneitra, Suwayda and Daraa. Also, this study demystifies the aspects of Israel's strategies to address these challenges after 2011. Thus, this study draws on three key border cities, Quneitra, Swayda, and Daraa, which are vital parts of Syria.

View Publication
Publication Date
Sun Jan 01 2023
Journal Name
3rd International Conference On Smart Cities And Sustainable Planning
Towards sustainable tourism: EIA of natural environment in Sawa lake using RIAM method
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Tue Nov 06 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Primary School Science Teachers' Knowledge towards Health Promotion in Baghdad City
...Show More Authors

Objective: Assessment of primary schools science teachers' knowledge towards health promotion in Baghdad City.
Methodology: A descriptive study was conducted at (100) primary school at Al-Rasafa, and Al-Karkh sectors in
Baghdad City, from November 29th 2007 to January 20th 2009. A probability stratified random sample of (100)
teachers who teach science subject was selected, and had at least one year of employment in the teaching field. A
questionnaire format was used which was consisted of (2) parts. The overall number of the items included in the
questionnaire were (205) items. The first part was related to the demographic data of the teachers, the second part
(six sections) was concerned with teachers' knowledge about

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 19 2023
Journal Name
Journal Of Information Systems Engineering And Management
Corporate Governance Towards Sustainability Performance Quality: A Case of Listed Firms in Malaysia
...Show More Authors

The sustainable development according to the United Nation, listed firms throughout globally now routinely provide sustainability data. However, there is not enough information on Sustainability Performance Quality (SPQ) in the majority of emerging economies, including Malaysia. This study looks at how the SPQ of the top 100 Malaysian-listed businesses is affected by factors as connected with corporate governance (e.g., board meeting, board size, and board ethnic diversity). Utilizing 500 firm-year data, a longitudinal sample of 500 nonfinancial firms on the Bursa Malaysia for 2015-2019 is employed in this study. The findings from the analysis using the panel regression demonstrated that: ethnic diversity and board siz

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Sat Nov 15 2025
Journal Name
Al–bahith Al–a'alami
Preferences of the Iraqi Public towards Arab News Channels Programs and Materials (Al Jazeera, Al Arabiya, Al Ekhbariya Satellite Channels: a field Study)
...Show More Authors

Broadcasting across satellites has become an important media phenomenon and largely available for watchers. As the receiver can see the events at the very moment and at any spot in the world. This study aims to discover the degree of the extent of exposure of Iraqi people to the news broadcasting satellites in Arabic language, (Al Jazeera, Al Arabiya, Al Ekhbariya Satellite Channels) as one of the media that serves the public; and to discover the range of these Satellite Channels in covering the local Iraqi situation in different sides and aspects; and to know the significance of the Iraqi people in watching those news programmers; and state the motives behind the Iraqi public's dependence on these channels.

The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 13 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Civil Engineering And Architecture
Impact of Urban Expansion on the Historic City of Babylon: Strategies for Preserving Heritage amidst Modernity
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Synthesis, Characterization, and Investigation the Inhibitory Impact of Thiosemicarbazide Derivative toward the Corrosion of Mild Steel in Acidic Media
...Show More Authors

        In this study we focused on the determination of influence the novel synthesized thiosemicarbazide derivative "2-(2-hydroxy-3-methoxybenzylidene) hydrazinecarbothioamide" (HMHC) influenced the corrosion inhibition of mild steel (MS) in a 1.0 M hydrochloric acid acidic solution.This is in an effort to preserve the metal material by maintaining it from corrosion.The synthesized inhibitor was characterized using elemental analysis, and NMR-spectroscopy. Then the corrosion inhibition capability of (HMHC) was studied on mild steel in an acidic medium by weight loss technique within variables [temperature, inhibitor concentration, and time]. The immersion periods were [1:00, 3:00, 5:00, 10:00, 24:00, and 72:00] hours and the tem

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Mon Nov 01 2021
Journal Name
Water Research
Fate and removal of silver nanoparticles during sludge conditioning and their impact on soil health after simulated land application
...Show More Authors

View Publication
Scopus (10)
Crossref (9)
Scopus Clarivate Crossref