Preferred Language
Articles
/
jcoeduw-820
Randomand and social security
...Show More Authors

The problem of informal settlements in Iraqi is one of the most serious problems due
to its economic, social and security impacts which jeopardize the society safety and stability.
This study investigates the present situation of informal settlements in the Baghdad
governorates as well as approaches followed in making decisions to either upgrade or remove
those areas. Requirements of each decision are also discussed.
Study methods relied on both office and field studies to collect data and information
needed. The study revealed important findings that would help take appropriate measures that
deal with the informal settlements in Iraqi. The study also proposes effective mechanisms to
preclude both an increase in current informal settlements' areas and the emergence of new
informal settlements.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Role of the School Garden, and its Importance in the school Building - A field study in the social school service
...Show More Authors

This research concerns the fact of the school garden and how can we tackle this issue. The research starts with a question forwarded to those who are interested in the ministry of education matters; the question is that how is the extent of interest in the school garden project? And how it is activated in the Iraqi Educational Institution program? In addition, the analysis reveals the importance of the school garden since we, as teachers and students, suffer from seeing the view of the trashes, the wastes of school furniture, the stinking water and the weeds and how it is accumulated in the back yard of the school. To add fuel to the fire, the increase in number of the students; year after year. This increase leads to adding more classes

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Article Japan's social structure and useful Implications for Iraq
...Show More Authors

The development of Japanese society passed through long historical stages and as a result of the bitter experience of Japan in the Second World War and its exhaustion, it was able to build a modern modern state after 1945. Japan is a country of culture, civilization, science and technology, a country that appreciates the value of solidarity work. And the role of active civil society. This is what makes us in Iraq stand and draw their experience in the advancement and development, especially that they also passed bitter political stages, Iraq today passes through the most historical periods of forestry through its historical heritage in terms of the existence of complex social problems, the US occupation of Iraq in 2003 highlighte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
The political dimension Engineering social characteristics and Alssayashllansan community
...Show More Authors

تستهدف هذه الدراسة وبشكل أساس، الكشف عن طبيعة وخصائص البعد السياسي لهندسة/صناعة الخصائص الاجتماعية والسياسية للإنسان والمجتمع، بوصفها العملية المسؤولة عن تصميم هذه الخصائص وصناعتها وتغييرها جزئيا أو كليا، دون أبعادها الأخرى المتعددة والمتنوعة، لا لمجرد الانسياق وراء دوافع الرغبة الذاتية، أو اعتبارات التخصص الدقيق وأحكامه، لأن معهما أيضا، بل وقبلهما أحيانا، دوافع واعتبارات أخرى موضوع

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 20 2021
Journal Name
International Journal Of Research In Social Sciences And Humanities
SOCIAL CAPITAL AND ITS IMPACT ON THE DEMOCRATIC CONSOLIDATION
...Show More Authors

View Publication
Crossref
Publication Date
Wed May 20 2026
Journal Name
Al–bahith Al–a'alami
The Interactive Communication and its Reflection on Social Capital
...Show More Authors

The Internet makes the world like a small village. It has the ability to make groups of the same ideas, thoughts, and identity close to each other by gathering them in one place. It is a way to communicate and share information and opinion; shaping and sharing of comprising individuals with common interests and the participation of individuals in a fruitful dialogue results in achieving a set of goals promote ideas and mobilizing people about issues and events of common interests.

To address the relationship of the internet via interactive communication and its ability to achieve social capital and discuss issues and various social events, the study sees that the problem of the study could be formulated as follows:

Consid

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Ieee Access
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN
...Show More Authors

Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat

... Show More
View Publication
Scopus (17)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref