Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.
We notice that the issue of development is one of the most important issues in ourepoch especially in our country which classify within back ward countries.
When we talk here about the development we don’t mean only the development of capitals or the development of products.but the most important thing is the development of mind .if we notice the experience of developits economy and it didn’t reach to the wanted aim.because these sides . The highness of the meutal rate of the nation is the standard of of the nation is the standard of the sentific and cultural advance for this nation .And that is what we have noticed in human societies ingenerall .
We noticed that
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
ABCTRACT
Care research examining the relationship between the variables of search presidents (employee training and organizational commitment) to determine the effect of the training of employees in organizations in achieving organizational commitment of employees towards their organizations and by the fact that training is one of the most important activities adopted by the administration and by which can benefit realized for workers and for the organization .ttjsd problem Search lack of training considered as a factor of the important factors in the development of staff skills and development work in many Iraqi companies, including vegetable oils company (where to look), which in turn raises the relevance and commitment
... Show MoreThe objective of the research is to identify the efficiency of risk management in various names at Baghdad International Airport in the face of various risks (financial - technical - human - natural ..) facing the sample of the search of the General Establishment of Civil Aviation and the Iraqi Airways Company where the researcher identified the hypothesis that summarizes There is a significant significant correlation between risk management, risk management and risk review and assessment. The researcher used the means of research from observation and interviews with the relevant officials in this field, as well as used the questionnaire and distributed a sample of 170 employees in the field of risk management (SMS Department) in Iraqi A
... Show MoreThe duration of sunshine is one of the important indicators and one of the variables for measuring the amount of solar radiation collected in a particular area. Duration of solar brightness has been used to study atmospheric energy balance, sustainable development, ecosystem evolution and climate change. Predicting the average values of sunshine duration (SD) for Duhok city, Iraq on a daily basis using the approach of artificial neural network (ANN) is the focus of this paper. Many different ANN models with different input variables were used in the prediction processes. The daily average of the month, average temperature, maximum temperature, minimum temperature, relative humidity, wind direction, cloud level and atmosp
... Show MoreInternational Journal on Technical and Physical Problems of Engineering
The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreObjective: The purpose of this work was to develop and optimize the emulgel formulation of piroxicam with two types of gelling agent chitosan and xanthan gum. The release profiles of prepared formulas were investigated. In addition, the rheology and stability of the best formula were investigated.Methods: Emulsified piroxicam was prepared to use oleic acid, tween 80 and PG with a ratio (3:10:10). In xanthan based emulgel, the xanthan gum (1% and 1.5%) was spread as powder on emulsified piroxicam with stirring until emulgel was formed. In chitosan-based emgels, Chitosan gel was added to emulsified piroxicam and stirring until the Emulgel was constructed. Chitosan gels were prepared by incorporating different concentration, 2%, 3%, 6%
... Show MoreThe purpose of this article is to introduce reverse engineering procedure (REP). It can achieved by developing an industrial mechanical product that had no design schemes throughout the 3D-Scanners. The aim of getting a geometric CAD model from 3D scanner is to present physical model. Generally, this used in specific applications, like commercial plan and manufacturing tasks. Having a digital data as stereolithography (STL) format. Converting the point cloud be can developed as a work in programming by producing triangles between focuses, a procedure known as triangulation. Then it could be easy to manufacture parts unknown documentation and transferred the information to CNC-machines. In this work, modification was proposed and used in RE
... Show More