Preferred Language
Articles
/
jRdEpY4BVTCNdQwCTFbj
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.

View Publication
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Efforts in cataloging manuscripts some Arab and international libraries
...Show More Authors

The Arab Islamic Manuscripts in the science libraries humanly global heritage in different types of knowledge and science, as they were not confined to a particular flag but extended to include all kinds of science, and to facilitate the knowledge of these types of manuscripts has been necessary to operate them indexed in most libraries , because it is important in determining the size of those manuscripts and set them up and facilitate the work of the investigators, as well as the significance of indexing to know printed manuscripts in order to avoid repetition of the publication of the manuscript more than once, especially if the deployment is to be characterized by accurate scientific integrity and following the origins of the scienti

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Psychological Security of Students in the Kindergarten Department
...Show More Authors

Abstract

The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.

View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Successful international experiences in childcare
...Show More Authors

The first few years of life is the basis for proper human personality and this Made by scientific studies and research need to make all efforts to achieve the early development of children and demonstrated by the efficiency and effectiveness of great success in the educational and developmental programs that have been applied to accelerate the children's growth rate in the various their sides, the current research aims to: identify the most successful international experience in the care and upbringing of children in early childhood has been determined by current research and previous studies manners within the cognitive perspective and dealing with the subject of this research and with respect to the theoretical framework Presented rese

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 15 2026
Journal Name
Journal Of Engineering
Technological Analysis of Flat Surface Conditions by Magnetic Abrasive Finishing Method (MAF)
...Show More Authors

This study introduced the effect of using magnetic abrasive finishing method (MAF) for finishing flat surfaces. The results of experiment allow considering the MAF method as a perspective for finishing flat surfaces, forming optimum physical mechanical properties of surfaces layer, removing the defective layers and decreasing the height of micro irregularities. Study the characteristics which permit judgment parameters of surface quality after MAF method then comparative with grinding

View Publication
Publication Date
Thu Jun 09 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The financial aid of the Central Bank of Iraq to the government and its reflection on indicators of banking stability/ Applied Research
...Show More Authors

The research aims to define the images of financial aid that it provides within their tasks (central banks to governments) and how it can affect the indicators of banking stability, as well as monitoring the levels of banking stability in the Iraqi economy through the indicators used by the Central Bank of Iraq, and the importance of research in banking stability lies in Iraq, because any decrease in the movement of the aggregate banking stability index will reflect negatively on the financial sector in Iraq. Therefore, the Central Bank sought to provide financial aid to the government through a group of components, some of which are represented by initiatives that contribute to revitalizing the national economy and the other hel

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Employing the indicators of stereotypes and the dimensions of organizational clarity and their role in achieving the planned organizational behavior Analytical study on a sample of workers in some departments of the Faculties of Engineering, University of
...Show More Authors

The current research examines the employment of indicators of stereotypes and the dimensions of organizational clarification to achieve planned organizational behaviour on a sample of employees in a number of departments of the Faculties of Engineering, University of Kufa, for a sample of (122) teaching staff. This research proposes the use of positive indicators of stereotypes for both the organization and employees and their awareness of what they want to obtain and what should be done for both parties and the removal of organizational clarity represented by the functional dimension that explores to what degree the employee's understanding of the internal strategy of the organization and the strategic dimension that searches fo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Prevalence of Posttraumatic Stress Symptomatology and Distribution of Attachment Patterns 1 and 5 Months after a Terrorist Attack
...Show More Authors

As a consequence of a terrorist attack, people may experience posttraumatic stress disorder (PTSD) and lack of feeling secure in relationships. This longitudinal study aimed to examine the prevalence of PTSD symptoms over time, the relationship between adult attachment styles and PTSD, as well as their association with degree of exposure, and finally to consider the distribution and the trajectory of attachment styles. The sample consisted of 235 students (M=125, F=110) who were exposed to different levels of trauma intensity in response to a bombing attack. Participants were recruited and assessed approximately 1 month and 5 months after the attack using a battery of questionnaires. Findings revealed, as expected, that 79.5% of the part

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref