Preferred Language
Articles
/
DxgIb5YBVTCNdQwCqYRN
Employment of Chinese Cyber Power in Regional Conflict Management Strategies The Case of Conflict with Japan After 2014
...Show More Authors

Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to uncertainty about the intentions of the rising power in the region, which is important to China. China has many memories of Japan's militarization from World War I, World War II, and beyond, when Japan became the cornerstone of the U.S. containment strategy for popular China in 1949. Therefore, this study aims to define cyber power, regional conflict management strategies, and cyber power pillars in general. The study also elaborates on the Chinese strategies used in cyber actions in its conflict with Japan after 2017.

View Publication
Publication Date
Sun Dec 01 2024
Journal Name
Journal Of The College Of Basic Education
Efficiency of SCL Via Google Classroom on Female Pre-service Teachers' Teaching Readiness
...Show More Authors

This study intends to examine the efficiency of student-centered learning (SCL) through Google classroom in enhancing the readiness of fourth stage females’ pre-service teachers. The research employs a quasi-experimental design with a control and experimental group to compare the teaching readiness of participants before and after the intervention. The participants were 30 of fourth stage students at the University of Baghdad - College of Education for Women/the department of English and data were collected through observation checklist to assess their teaching experience and questionnaires to assess their perceptions towards using Google Classroom. Two sections were selected, C as a control group and D as the experimental one each with (

... Show More
Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
2nd International Conference On Mathematical Techniques And Applications: Icmta2021
Antimicrobial activities of some new heterocyclic compounds bearing imidazo[2,1-b]benzothiazole moiety
...Show More Authors

View Publication
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Clinical And Experimental Dental Research
Prevalence and factors influencing reporting of true periodontal chief complaints: A retrospective analysis
...Show More Authors
Abstract<sec><title>Objectives

To investigate the prevalence of true periodontal chief complaints (CC) and the factors affecting their reporting by patients with periodontal diseases (PD).

Materials and Methods

This cross‐sectional study was based on retrospective analysis of available periodontal records. Different personal and demographic variables were obtained from these records including CC, age, gender, working status, past medical/dental history, smoking status and diagnosis. In addition, clinical parameters of plaque index, gingival index, probing pocket depth (PPD), and number of missing teeth. Periodontal CC were r

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Jun 09 2017
Journal Name
Iraqi National Journal Of Chemistry
Synthesis and Characterization of some New Oxazepine Compounds Derived from D-Erythroascorbic Acid
...Show More Authors

This search include the synthesis of some new 1,3-oxazepine derivatives have been prepared, starting from reaction of L-ascorbic acid with dry acetone in presence of dry hydrogen chloride afforded the acetal (I). Treatment of the latter with p-nitrobenzoyl chloride in pyridine yielded the ester (II) which was dissolved in (65%) acetic acid in absolute ethanol yielded the glycol (III). The reaction of the glycol (III) with sodium periodate in distilled water at room temperature produced the aldehyde (IV). The compound (V) [4-(1,3-dioxoisoindolin-2-yl)benzoic acid] was synthesized by reaction p-aminobenzoic acid and phthalic anhydride in presence of (gla. CH3COOH). Reaction of compound (V) with thionyl chloride produced [4-(1,3-dioxoisoindoli

... Show More
Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Numerical Analysis of Least-Squares Group Finite Element Method for Coupled Burgers' Problem
...Show More Authors

In this paper, a least squares group finite element method for solving coupled Burgers' problem in   2-D is presented. A fully discrete formulation of least squares finite element method is analyzed, the backward-Euler scheme for the time variable is considered, the discretization with respect to space variable is applied as biquadratic quadrangular elements with nine nodes for each element. The continuity, ellipticity, stability condition and error estimate of least squares group finite element method are proved.  The theoretical results  show that the error estimate of this method is . The numerical results are compared with the exact solution and other available literature when the convection-dominated case to illustrate the effic

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 21 2020
Journal Name
Baghdad Science Journal
Synthesis of Gold Nanoparticles by using Batch Method and Study its Antibacterial Activity
...Show More Authors

The research involves preparing gold nanoparticles (AuNPs) and studying the factors that influence the shape, sizes and distribution ratio of the prepared particles according to Turkevich method. These factors include (reaction temperature, initial heating, concentration of gold ions, concentration and quantity of added citrate, reaction time and order of reactant addition). Gold nanoparticles prepared were characterized by the following measurements: UV-Visible spectroscopy, X-ray diffraction and scanning electron microscopy. The average size of gold nanoparticles was formed in the range (20 -35) nm. The amount of added citrate was changed and studied. In addition, the concentration of added gold ions was changed and the calibration cur

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Medical Journal Of Babylon
Optimum Conditions for Pyomelanin Production and Characterization from Local Isolates of Pseudomonas aeruginosa
...Show More Authors

Nowadays, there is increased interest in the biosynthesis of microbial melanin related to their numerous biological functions and applications in many fields, especially in medical fields, including immune-modulating, antimicrobial antibiotic, antiviral antivenin, anticancer, antitumor activity, and anti-biofilm activity. Pyomelanin is a hydrophobic macromolecule that is typically dark brown or black in color, formed by the oxidative polymerization of phenolic or indolic compounds. Pyomelanin is reported to be safe for consumption, thus providing a crucial strategy for biocontrol of biofilm. Furthermore, natural pyomelanin is known as a potent antioxidant, photoprotective, and free radical scavenging. Objective: This study focuses on the

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
Historical description of Ghazuti (al-Khandaq and Banu Qurayza) Hegira 5 - AD 626
...Show More Authors

Research Summary

 

Praise be to God, and may blessings and peace be upon our master Muhammad al-Mustafa, his family, his companions, and those who follow his gift until the Day of Judgment.

As for the dimension: This is a historical description of my conquest (Al-Khandaq and Ba

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Effect of Velocity on Dissolved Oxygen Cathodic Polarization using a Rotating Cylinder Electrode
...Show More Authors

The aim of the present work to study the effect of changing velocity (Reynold's number) on oxygen cathodic polarization using brass rotating cylinder electrode in 0.1, 0.3 and 0.5N NaCl solutions (PH = 7) at temperatures 40, 50 and 600 C. Cathodic polarization experiments were conducted as a function of electrode rotational speed and concentration.

View Publication Preview PDF
Crossref