Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThe interplay of predation, competition between species and harvesting is one of the most critical aspects of the environment. This paper involves exploring the dynamics of four species' interactions. The system includes two competitive prey and two predators; the first prey is preyed on by the first predator, with the former representing an additional food source for the latter. While the second prey is not exposed to predation but rather is exposed to the harvest. The existence of possible equilibria is found. Conditions of local and global stability for the equilibria are derived. To corroborate our findings, we constructed time series to illustrate the existence and the stability of equilibria numerically by varying the different values
... Show MoreThe "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show Moreنشاطات فرع الدراسات الدولية
The objective of the research is to identify the efficiency of risk management in various names at Baghdad International Airport in the face of various risks (financial - technical - human - natural ..) facing the sample of the search of the General Establishment of Civil Aviation and the Iraqi Airways Company where the researcher identified the hypothesis that summarizes There is a significant significant correlation between risk management, risk management and risk review and assessment. The researcher used the means of research from observation and interviews with the relevant officials in this field, as well as used the questionnaire and distributed a sample of 170 employees in the field of risk management (SMS Department) in Iraqi A
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Researching performance audits according to the dimensions of financial sustainability in light of the scarcity of resources and economic and social transformations in the business environment is of utmost importance in the non-profit non-governmental organizations in achieving the goals and correct the path and address deviations, and help them in improving the outputs of processes and associated procedures and capacity The research was based on the hypothesis that the existence of a performance audit program in accordance with the dimensions of financial sustainability leads to the measurement of the commitment of the Olympic Committee. National Iraqi indicators of financial sustainability of the dimension of revenue in order to improv
... Show MoreAbstract
The concept of unipolar has allowed the united states of America to
control the rest of the internations community units through the rxclusively of
control in international affairs without enabling other countries who have the
ability to compete with it to appear this comes as a result of it's position to all
kinds of powers like military, economic and technical powers that enable it to
continue dominating other countries, this superior control enabled it to be the
(hyper power) on the international political scene so that it allowed it to
exercise and implement the policy of domination against all this appeared
after its empire superiority became clear, in a unique way that have never
been known in
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreAt a time when any tourist in the world wants a trip to reload his energy and enjoy peace and quiet and engage in adventures in a safe environment, terrorism comes to disturb him on that journey through operations aimed at the tourist and entertainment destinations, such as shops, restaurants, cafes and hotels Is the orbit of research) for many reasons. The security measures taken by hotels play an important and fundamental role in preventing or limiting these terrorist operations. At the same time, while some hotel administrations are constantly seeking to improve these measures to preserve the safety of their guests and visitors, In spite of the high number of attacks on hotels since 2001 and today. This research is intended to highlight
... Show More