Preferred Language
Articles
/
jcois-2172
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protect the Islamic community from this dangerous epidemic and to inject Islamic youth with the serum of the true faith to confront the disease of the age, which is atheism, by refuting atheistic suspicions and responding to them, and warning Islamic societies of their danger and alerting to the devious ways that the enemies of Islam followed it in spreading poisons and atheistic ideas, and finding out the mechanism for immunizing the individual and society from being affected by atheistic principles through the role of the media in spreading the necessary awareness to eliminate this phenomenon that is spreading in future generations, and activating the role of the teacher and educator in schools and universities to educate promising youth against this The fierce attack that wants to destroy the Islamic faith.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Corporate And Business Strategy Review
The role of learning organizations in crisis management strategy: A case study
...Show More Authors

The problem of the paper focused on the role of the learning organization in the crisis management strategy, and the extent of the actual interest in both the learning organization and the crisis management and aimed at diagnosing and analyzing that and surrounding questions. The Statistical Package for the Social Sciences (SPSS) program was used to calculate the results and the correlation coefficient between the two main variables. The methodology was descriptive and analytical. The case study was followed by a questionnaire that was distributed to a sample of 31 teachers. The paper adopted a seven-dimensional model of systemic thinking that encourages questioning, empowerment, provision of advanced technologies, and strategic lea

... Show More
View Publication
Scopus (16)
Crossref (9)
Scopus Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-kindy College Medical Journal
The Role of Aspirin as Otoprotective Agent in Patients Receiving Amikacin Therapy
...Show More Authors

Objective: To investigate and prove that aspirin
protects, or at least attenuates amikacin ototoxicity in
humans.
Method: This study was conducted in 60 patients that
completed all
requirements .The patients were divided into two
groups:
• Control group: receive placebo treatment.
• Drug–treated group: They receive aspirin
coated tablets (1.5gm/ day), 500mg 8 hourly.
Both groups had similar aspects regarding the gender,
age and weight. The duration of therapy was 7 days
and dosage of amikacin was 1gm/day (500mg 12
hourly).
Results: Comparison of Audiometry test in
Ear/Nose/Throat (E.N.T.) Department (Pure Tone
Audiometry) at 1000 Hertz (Hz), 2000 Hz, 4000 Hz,
and 8000 Hz showed sig

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Res Militaris
Relationship marketing and its role in the success of industrial project management
...Show More Authors

The research aims to identify the role determined by the dimensions of marketing in the relationship represented by (trust in the relationship, commitment to the relationship, communication during the relationship) in how to contribute to the success of the industrial project management in Iraq as a case study in the General Directorate of Industrial Development. Their number is (50) workers, where the research problem centered on knowing the impact and importance of relationship marketing on the success of industrial project management. The descriptive analytical approach. Using SPSS and Amos, the researcher tested and analysed hypotheses about the relationship and the influence between the research variables through a questionnaire . Test

... Show More
Scopus (3)
Scopus
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
The role of road elements in providing a safe environment for pedestrians
...Show More Authors

In the years recently city planning projects have been confirmed sustainable high concentration on planning streets and pedestrian paths being the most prominent component of the urban structure in the city and these me and diverse departments link the city’s sectors and serve as a space for economic, service, and social activities. On the other hand, pedestrian traffic is an essential component of the various means of transportation within the city. Suffer cities in the Middle East and Arab cities in particular are neglecting pedestrian paths in the vital urban environment. Vehicle control mechanisms on roads, and changing the uses of pedestrian paths as result of encroaching on the sidewalks designated for pedestrians. Which leads to a

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Oct 19 2025
Journal Name
Studies In Systems, Decision And Control
The Role of Artificial Intelligence in Achieving Tax Compliance: Evidence from Iraq
...Show More Authors

This study focuses on how tax administrations in Iraq use Artificial Intelligence (AI) techniques to monitor tax evasion for individuals and companies to achieve Tax Compliance (TC). AI was measured through four dimensions: Advanced Data Analytics Techniques (ADAT), Explainable AI (EAI), Machine learning (ML), and Robotic Process Automation (RPA). At the same time, TC was measured through registration, accounting, and tax payment stages. We relied on the questionnaire form to measure the variables. A sample of employees in the General Tax Authority in Iraq was selected, and a questionnaire was distributed to 132 people. The results indicated that the dimensions of AI affect achieving TC at all stages. This study provides evidence of using A

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Nov 01 2024
Journal Name
Human Antibodies
The potential role of dyslipidemia in COVID-19 severity among Iraqi patients
...Show More Authors
BACKGROUND:

The correlation between dyslipidemia and the severity of coronavirus disease 2019 has been widely categorized. Dyslipidemia is one of the most dominant disorders among these patients. Systemic inflammation accompanied by cytokine storm hemostasis modifications and severe vasculitis have all been reported to occur among COVID-19 patients, and these may contribute to some severe complications.

OBJECTIVE:

The aim of this study is to assess the possible relationship between dyslipidemia and the severity of coronavirus disease 2019.

METHODS:

This work encompassed 200

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 08 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Bifurcation analysis of the role of good and bad bacteria in the decomposing toxins in the intestine with the impact of antibiotic and probiotics supplement
...Show More Authors

This study presents a mathematical model describing the interaction of gut bacteria in the participation of probiotics and antibiotics, assuming that some good bacteria become harmful through mutations due to antibiotic exposure. The qualitative analysis exposes twelve equilibrium points, such as a good-bacteria equilibrium, a bad-bacteria equilibrium, and a coexisting endemic equilibrium in which both bacteria exist while being exposed to antibiotics. The theory of the Sotomayor theorem is applied to study the local bifurcation around all possible equilibrium points. It’s noticed that the transcritical and saddle-node bifurcation could occur near some of the system’s equilibrium points, while pitchfork bifurcation cannot be accrued at

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF