Preferred Language
Articles
/
jcois-2172
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protect the Islamic community from this dangerous epidemic and to inject Islamic youth with the serum of the true faith to confront the disease of the age, which is atheism, by refuting atheistic suspicions and responding to them, and warning Islamic societies of their danger and alerting to the devious ways that the enemies of Islam followed it in spreading poisons and atheistic ideas, and finding out the mechanism for immunizing the individual and society from being affected by atheistic principles through the role of the media in spreading the necessary awareness to eliminate this phenomenon that is spreading in future generations, and activating the role of the teacher and educator in schools and universities to educate promising youth against this The fierce attack that wants to destroy the Islamic faith.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication
Publication Date
Sat Jun 15 2024
Journal Name
Obstetrics & Gynaecology Forum
THE ROLE OF FUNGAL INFECTIONS IN THE PATHOGENESIS OF DIALYSIS-DEPENDENT AND NON-DIALYSIS-DEPENDENT PATIENTS WITH KIDNEY DISEASE
...Show More Authors

Abstract The results of isolation, morphological and microscopic diagnosis, Chromic Agar, Vitik technology and Bact Alert showed that the diagnosis of fungi isolated from blood samples of end-stage renal patients who did not undergo dialysis and those who underwent dialysis was 60 samples for each type. The total number of fungal isolates isolated from people who did not undergo dialysis was 26 pathogenic fungal isolates, with a percentage frequency of 43.33%. In this study, 4 genera of pathogenic fungi were identified: Candida spp, Rhodotorula spp, Cryptococcus spp. and Aspergillus spp. The number of Candida isolates reached 13 isolates, with a frequency of 50%. The results also showed that the diagnosed species from the genus Rhodotorula

... Show More
Publication Date
Mon Jan 29 2024
Journal Name
2024 3rd International Conference On Digital Transformation And Applications (icdxa)
The Mediating Role of Cobit 2019 in Managing the Relationship Between Qualitative Characteristics of Accounting Information and Information Asymmetry
...Show More Authors

The Mediating Role of Cobit 2019 in Managing the Relationship Between Qualitative Characteristics of Accounting Information and Information Asymmetry

View Publication
Scopus Crossref
Publication Date
Fri Feb 10 2023
Journal Name
Dentistry Journal
The Role of Social Media in Communication and Learning at the Time of COVID-19 Lockdown—An Online Survey
...Show More Authors

This study aimed to assess orthodontic postgraduate students’ use of social media during the COVID-19 lockdown. Ninety-four postgraduate students (67 master’s students and 27 doctoral students) were enrolled in the study and asked to fill in an online questionnaire by answering questions regarding their use of social media during the COVID-19 lockdown. The frequency distributions and percentages were calculated using SPSS software. The results showed that 99% of the students used social media. The most frequently used type of social media was Facebook, 94%, followed by YouTube, 78%, and Instagram, 65%, while Twitter and Linkedin were used less, and no one used Blogger. About 63% of the students used elements of social media to l

... Show More
View Publication
Scopus (13)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Role of Certain Figures of Emphasis in the Televised Debate between Macron and Le Pen on may 3, 2017».: Le rôle de certaines figures d’insistance utilisées dans le débat télévisé entre Macron et Le Pen le 3 mai 2017
...Show More Authors

      Political Discourse Analysis is an important linguistic study approach used by politicians to gain people support. The present paper sheds light on the figures of speech  of emphasis in the televised debate between the two presidential elections candidates, Emmanuel Macron and Marine Le Pen and the distinctive effect they add to the political discourse to win general public support as well as the presidential elections.

       The present paper provides a rudimentary definition and an analysis of the terms “discourse” and “political discourse” and traces the significant role played by politically directed televised Media and internet to support political pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 18 2024
Journal Name
Journal Of Economics And Administrative Sciences
The Role Of Cognitive Sharing In Enhancing The E-Learning Quality An Analytical Study Of A Sample Of Iraqi Universities
...Show More Authors

The world faced many communication challenges in 2020 after the Covid-19 pandemic, the most important of which was the continuation of schooling. Therefore, the research aimed to analyze the current reality of the studied universities in terms of strengths and weaknesses and measure the implementing level of quality requirements of e-learning. This research studies the impact of knowledge sharing in its dimensions (behavior, organizational culture, work teams, and technology) on the e-learning quality and its dimensions (e-learning management, educational content, evaluation ,and evaluation). After conducting the survey, there was a difference in the universities’ application of the quality requirements of e-learning, as the study

... Show More
View Publication
Crossref
Publication Date
Fri Jun 16 2023
Journal Name
Journal Of Humanities And Social Sciences Researches
The Role and Importance of Electronic Automation in Banking Service Development: A Case Study of the Commercial Bank of Iraq
...Show More Authors

Electronic banking services appeared as a result of laying the foundations for the application of electronic automation in the banking field, and despite the clear expansion in its adoption and implementation as an inevitable necessity imposed by international and national developments, its application was not ideal according to the level that was expected to occur after the abandonment of traditional banking services, which produced some risks Which is evident in the absence of a legal system, whether at the level of proving and authoritative electronic banking services such as electronic signature, Or at the level of protecting the confidentiality of these services and ensuring that they are not exp

... Show More
Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Oncology And Radiotherapy
The role of Modulation Complexity Score (MCS) of the VMAT and IMRT techniques in the treatment planning of left non-small lung cancer
...Show More Authors

Background: Lung cancer is a common disease for patients over the age of 50 years, especially males due to smoking habits. This study aimed to compare the modulation complexity score (MCS) for the advanced treatment planning techniques which the intensity modulated radiation therapy (IMRT) and volumetric modulated arc therapy (VMAT). Materials and Methods: Thirty patients who had non-small lung cancerous tumors on their left side participated in this study. The range ages were 68 to 98 years, the heights were between 151 and 182cm and they having weights from 46 to 79 kg. For Each patient will create two plans dial using two different techniques, which will be Intensity Modulated Radiation Therapy (IMRT) and Volumetric Modulated Arc Therapy

... Show More
Scopus (1)
Scopus