Preferred Language
Articles
/
MRc0vpIBVTCNdQwCUb8p
Law and its influential role for strategic leadership in managing security crises in Iraq
...Show More Authors

Scopus
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
A study of the safety and security conditions followed in the X-ray clinics in the Al-Amiriya-Baghdad
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
Alternative Sanctions and their Impact on Societal Security: A Field Study in the Directorate of Juveniles Reformatory in Baghdad
...Show More Authors

Crime is one of the most severe challenges facing States, and strives to find preventive measures, reduce its seriousness, and prevent them; due to developments, crimes have increased, and emerging new patterns of crimes, there is an urgent need to prevent crimes and reduce their effects. Modernizing its punitive system and diverting it to correctional rehabilitative justice to redress the prejudice caused by the crime and rehabilitate the convicted person by using alternative measures to short-term imprisonment. This research emphasizes alternative sanctions' value to minimizing short-term imprisonment penalties and their impact on societal security through several goals like, the negative consequences, justifications, and alternatives

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Level of Psychological Burnout among University Professors in Light of Armed Conflicts in Yemen: Center for Political and Strategic Studies - Sana'a University - Yemen
...Show More Authors

The research aims to identify the level of psychological burnout among the professors of Sana’a University in light of the armed conflicts in Yemen. The research sample consisted of (104) faculty members. A descriptive-analytical approach was adopted. The results of the research showed that university professors suffer from psychological burnout at a very high level in the overall score of the scale. There were no statistically significant differences in terms of gender, academic degree, teaching experience, marital status, number of family members, or salary. In light of the results, the researcher presented a number of relevant recommendations and suggestions.

View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The strategy of preventive war In US National Security Documents (2002-2006)
...Show More Authors

The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educati

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The impact of the strategic foresight capabilities in green creativity An exploratory study for the State Company for Food Products
...Show More Authors

 

The current research variables have received increasing attention in the recent period because they are one of the important issues affecting the future of organizations, as a result of the speed of environmental variables that have greatly affected organizations and for the purpose of explaining the relationships and links between research variables, as this research presents a test "the type and direction of the relationship between strategic foresight capabilities As an independent variable and green creativity "as a respondent variable. A set of questions has arisen about the basic research problem, including what is the nature and level of interest in the research variables (strategic foresight capabilities an

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Requirements for achieving financial balance in Iraq
...Show More Authors

The deficit of the federal budget and the structural imbalances suffered by the Iraqi economy has affected the direction of research towards suggesting steps and mechanisms can be relied upon in the near term to form a broader base of non-oil revenues aimed at achieving a balanced budget, and to proceed to reform the financial situation, In reducing their financial dictates, whether capital or operational, which lead to significant financial and economic consequences. This also requires that the Iraqi political elite have the real will, strategic vision and full awareness that the implementation of these reforms has potential social and economic effects, with long-term measures to be taken. The aim is not only to reform the finan

... Show More
View Publication Preview PDF
Crossref