Preferred Language
Articles
/
FRcu7Y4BVTCNdQwCuFpa
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the state issuing it does not take precedence over the interest of society as it is prevalent in traditional punitive laws (and the Iraqi law among them). In addition to the importance of expanding the legal diagnosis of images of indirect prejudice to social security that takes the form of media, economic and political activity, whether its source is internal or external. And presenting an integrated vision of state security that goes beyond the traditional formula in distinguishing between internal and external state security and considers the holistic character of the concept of state security in the modern era.

View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Jun 28 2019
Journal Name
Journal Of The College Of Education For Women
The most important ministers of the Abbasid state until the end of the era (198-218 AH)
...Show More Authors

The existence of succession system has appeared in Arab Islamic state after the death of the prophet Mohammed (peace be upon God and peace), So there was caliphate, then the Umayyad dynasty in Syria , until 132 AH , the date o the emergence of the Abbasid state adopted a system ministry formally , hafs bin sulaiman ( Abu salamah Khallal ) was the first  minister emerged on the political scene. He was killed at the time of the first  Abbasid caliph , Abu Albbas , incest 132-136 who had put Khalid bin barmak as a minister instead of Hafs bin Sulaiman . During the reign of AL-Mansur 136-158 , there was an importance and a place for the ministry , despite of AL-Mansur strength personality that covered on his ministers personalities

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Toxicity of Nanomulsion of Castor Oil on the Fourth larval stage of Culex quinquefsciatus under Laboratory Conditions
...Show More Authors

Mosquitoes like Culex quinquefasciatus are the primary vector that transmits many causes of diseases such as filariasis, Japanese encephalitis, and West Nile virus, in many countries around the world. The development in the scientific fields, such as nanotechnology, leads to use this technique in control programs of insects including mosquitoes through the use of green synthesis of nanoemulsions based on plant products such as castor oil.  Castor oil nanoemulsion was formulated in various ratios comprising of castor oil, ethanol, tween 80, and deionized water by ultrasonication. Thermodynamic assay improved that the formula of (10 ml) of castor oil, ethanol (5ml), tween 80 (14 ml) and deionized water (71ml)   was mor

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Apr 26 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Video Copyright Protection
...Show More Authors

Illegal distribution of digital data is a common danger in the film industry, especially with the rapid spread of the Internet, where it is now possible to easily distribute pirated copies of digital video on a global scale. The Watermarking system inserts invisible signs to the video content without changing the content itself. The aim of this paper is to build an invisible video watermarking system with high imperceptibility. Firstly, the watermark is confused by using the Arnold transform and then dividing into equal, non-overlapping blocks. Each block is then embedded in a specific frame using the Discrete Wavelet Transform (DWT), where the HL band is used for this purpose. Regarding the method of selecting the host frames, the

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Mon Feb 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using Classification of Brown risks in Evaluation of the internal control system: Application Research in Karbala University
...Show More Authors

Internal control system is a safety valve that preserves economic units assets and ensure the accuracy of financial data, as well as to obligation in the laws, regulations, administrative policies ,and improve the efficiency, effectiveness and economic of operation, so it has become imperative for these units attention to internal and developed control system The research problem in exposure the economic units when the exercise of their business to many of the risks to growth or hinder the achievement of its objectives and the risks (financial, operational, strategy, risk) and not it rely on risk Assessment according to modern scientific methods, as in Brown's risk Classification, Which led to the weakness of the internal control identif

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Possible Options in Managing the Exchange Rate of the Iraqi Currency in light of Current Economic Conditions
...Show More Authors

The management of the exchange rate of the most important tools of economic policy because of its wide area in achieving stability and economic growth through the provision of stability in the exchange rate of the currency of the country concerned , as well as the impact and influence of money supply and then treat the economic crisis monetary and reduce the risk of currency exchange rate .For the management of the exchange rate in Iraq has passed through several stages , from installation to link to a basket of currencies to float freely , and we are dealing with in this research regard to the achievements of monetary policy , especially after the enjoyment of independence on according to the Iraqi Central Bank Law No. 56 of 2004 and Ma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Consumer protection in e-marketing contracts An analytical study.: Consumer protection in e-marketing contracts An analytical study.
...Show More Authors

Marketing plays a role in the transfer of consumer desires through research, studies and satisfy the needs process, and with the technical development has evolved and marketing departments in the world of commerce has made great strides since the expansion of the trade deal, especially in light of spread of the Internet and the culture of use where he became a lot as individuals or institutions are dealings via electronic shopping . In all cases, we find that the consumer is important party, and that the legal rules did not leave the shopping process or contracting E without protection and I've dealt with so many studies through the civil protection for the consumer in electronic contracts legally with an analytical study of the

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 04 2020
Journal Name
College Of Islamic Sciences
The Seljuk Rum State in  Asia Minor and the Mongol Invasion 634 - 708 AH / 1236 - 1308 AD
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
And after:
      The research dealt with an important and critical era in the history of the Seljuk State of the Romans in Asia Minor, as that country, after the assumption of Sultan Ghiath al-Din Kehsaru II in the year 634 AH / 1236 CE, was subjected to the constant Mongol threat, so the research came marked with (the Seljuk State of Rome in Asia Minor and the Mongol invasion 634 - 708 AH / 1236 - 1308 AD) The research showed the succession of the Seljuk Sultans to the rulers whose rule after the death of Sultan Alaeddin Kikbad was weak and subject to the authority of the Mongols

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 19 2019
Journal Name
Political Sciences Journal
Dialectical relationship between the civil state and the application of Sharia In contemporary Islamic political thought ج
...Show More Authors

The political movements of Islam are among the most prominent phenomena of the popular uprisings witnessed by the Arab world. However, this rise and the rise of some movements led to many problems on the political theses of Islam, especially those associated with the ideas of Islamic ideologues and their slogan Legitimacy and the authorities as the origin of the divine, and said the application to achieve the Islamic solution, and then became the state in theses of some Islamists a tool to apply the law and then the preservation of religion.

View Publication Preview PDF
Crossref