Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.
This study aims to identify the amount of the effect of the ability to learn the individuals within the organization on the accumulation of intellectual capital and the role it plays in improving the performance of the organization, and to achieve that, the researcher designed a questionnaire to collect data and information from the surveyed respondents and analyzed using SPSS software, the study concluded after testing hypotheses to have a direct impact between the capacity for organizational learning and the accumulation of intellectual capital, which in turn affects the accumulation of intellectual capital as a positive and direct impact on the performance of the organization, al
... Show MoreThe "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreThis study aims to identify how the Zakat Fund contributes to financing entrepreneurial projects; and the role that these projects play in achieving economic and social development, despite the importance that contracting projects have in most countries as the main engine of growth; however, they still face many challenges that In the forefront of which is the challenge of obtaining financing; in this regard, it is possible to resort to the use of Zakat funds in the Islamic economy as it is a funding source that is closely proportional to the characteristics and goals of entrepreneurial projects in achieving development;
 
... Show MoreThis work has been carried out to develop national drug product contains 2.5mg/ml clonazepam as oral drop; it is used for the treatment of epilepsy in infants and children.
Several formulations were prepared using oral drop base, flavor, buffer, sweeteners and preservatives. Selection of best formula relied solely on physic-chemical testing of samples.
Stability study was conducted on the product for six months at different temperatures to determine the expiration date and the best storage conditions.
From the study we obtained an oral drop of good clear solution. The expiry date calculated to be not less than 2 years.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The agricultural activity has a great significance in the all four dimensions of sustainable development. Firstly, the economic dimension which it contributes with the GDP, as well as, it is considered as an important source to attract the investment. Secondly, the environmental dimension which also contributes with conserving of the biodiversity, combating the desertification, and increasing the farmlands. Thirdly, for its role in the social dimension to achieve the food security, to eradicate the poverty, and providing jobs. Fourthly, toward the institutional dimension as well it is considered as a source that allows all people to participate effectively, and to exchange of the local and universal experiences and perspectives. For conf
... Show MoreAt the local level in the early 1990s first established an Islamic bank 1993 is called Iraqi Islamic bank and was established by Dr. abdullatef hmim and with capital of 200 Million Iraqi dinars .
After 2003 began the attention of Iraqis tend to create Islamic banks until now up to 30 banks in the present , He confirmed Mr. Governor of the Iraqi Central Bank recently that there is more than 40 iintroduction licence to establish an Islamic bank in Iraq , That banking activity which is compatible with Sharia law widely welcomed by savers and those in need for more development and modernization in order to gain a greater share within the Iraqi market , and allowed the Iraqi Central Bank in recent years
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show Morethe history of the Scouting movement reflects the global social cultural and technological change over more than a century. scouting aims to develop young people worldwide through educational programs based on specific principles and values. in arab countries, the scouting movement is considered one of the most important platforms contributing to developing young people and enhancing their rule. positive in society, began with the establishment of the first Scout camp in the region and witnessed great growth and prosperity over the decades the research reveals the historical roots and development of the scout movement in the leading arab countries and analyzes the positive impact of scout movement in the leading arab countries on the develo
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show More