Preferred Language
Articles
/
jRdEpY4BVTCNdQwCTFbj
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.

View Publication
Publication Date
Mon Oct 22 2018
Journal Name
Journal Of Economics And Administrative Sciences
The role of organizational learning ability to improve the performance of hospital organizations under the accumulation of intellectual capital Study hospital enterprise sector in Algeria
...Show More Authors

        This study aims to identify the amount of the effect of the ability to learn the individuals within the organization on the accumulation of intellectual capital and the role it plays in improving the performance of the organization, and to achieve that, the researcher designed a questionnaire to collect data and information from the surveyed respondents and analyzed using SPSS software, the study concluded after testing hypotheses to have a direct impact between the capacity for organizational learning and the accumulation of intellectual capital, which in turn affects the accumulation of intellectual capital as a positive and direct impact on the performance of the organization, al

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the Zakat Fund in financing entrepreneurial projects to achieve development
...Show More Authors

            This study aims to identify how the Zakat Fund contributes to financing entrepreneurial projects; and the role that these projects play in achieving economic and social development, despite the importance that contracting projects have in most countries as the main engine of growth; however, they still face many challenges that In the forefront of which is the challenge of obtaining financing; in this regard, it is possible to resort to the use of Zakat funds in the Islamic economy as it is a funding source that is closely proportional to the characteristics and goals of entrepreneurial projects in achieving development;

   &nbsp

... Show More
View Publication Preview PDF
Publication Date
Mon May 23 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Iraqi Pharmaceutical Formula for Clonazepam Oral Drop 2.5 mg/ ml to Treat Seizure Epilepsy in Infants and Children with its Stability Study.: Iraqi Pharmaceutical Formula for Clonazepam Oral Drop 2.5 mg/ ml to Treat Seizure Epilepsy in Infants and Children with its Stability Study.
...Show More Authors

This work has been carried out to develop national drug product contains 2.5mg/ml clonazepam as oral drop; it is used for the treatment of epilepsy in infants and children.
Several formulations were prepared using oral drop base, flavor, buffer, sweeteners and preservatives. Selection of best formula relied solely on physic-chemical testing of samples.
Stability study was conducted on the product for six months at different temperatures to determine the expiration date and the best storage conditions.
From the study we obtained an oral drop of good clear solution. The expiry date calculated to be not less than 2 years.

View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of accounting standards, audit and finances in control On agricultural activity to achieve sustainable development
...Show More Authors

The agricultural activity has a great significance in the all four dimensions of sustainable development. Firstly, the economic dimension which it contributes with the GDP, as well as, it is considered as an important source to attract the investment. Secondly, the environmental dimension which also contributes with conserving of the biodiversity, combating the desertification, and increasing the farmlands. Thirdly, for its role in the social dimension to achieve the food security, to eradicate the poverty, and providing jobs. Fourthly, toward the institutional dimension as well it is considered as a source that allows all people to participate effectively, and to exchange of the local and universal experiences and perspectives. For conf

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The redesign of the accounting system to banks in the local environment in accordance with international Islamic banking applications
...Show More Authors

At the local level in the early 1990s first established an Islamic bank 1993 is called Iraqi Islamic bank and was established by Dr. abdullatef hmim and with capital of 200 Million Iraqi dinars .

After 2003 began the attention of Iraqis tend to create Islamic banks until now up to 30 banks in the present ,  He confirmed Mr. Governor of the Iraqi Central Bank recently that there is more than 40 iintroduction licence to establish an Islamic bank in Iraq , That banking activity which is compatible with Sharia law widely welcomed by savers and those in need for more development and modernization in order to gain a greater share within the Iraqi market , and allowed the Iraqi Central Bank in recent years

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Apr 13 2024
Journal Name
مجلة واسط للعلوم الریاضیة
The development of the leading Arab scouting movements and their role in the development of youth and society
...Show More Authors

the history of the Scouting movement reflects the global social cultural and technological change over more than a century. scouting aims to develop young people worldwide through educational programs based on specific principles and values. in arab countries, the scouting movement is considered one of the most important platforms contributing to developing young people and enhancing their rule. positive in society, began with the establishment of the first Scout camp in the region and witnessed great growth and prosperity over the decades the research reveals the historical roots and development of the scout movement in the leading arab countries and analyzes the positive impact of scout movement in the leading arab countries on the develo

... Show More
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref