Preferred Language
Articles
/
jcopolicy-167
Iraq's role in US security arrangements In the Greater Middle East project
...Show More Authors

إن موضوع الشرق الأوسط بشكل عام اتخذ أهمية كبيرة في الكتابات والمؤلفات التي صدرت منذ بداية النصف الأول من عقد التسعينات من القرن المنصرم مع بدايات مشاريع السلام التي أعقبت انهيار الاتحاد السوفيتي وتغير الخارطة السياسية والاقتصادية والايديولوجية للعالم .وعلى الرغم ان المصطلح ليس بجديد الا ان تعابير المصطلح وددلالاته تتغير مع تغير موازين القوى واتجاهات المصالح. إذ انتقل من مصطلح جغرافي الى سياسي وهاهو يطرح من جديد على انه مصطلح اصلاحي ذو دلالات ديمقراطية وأهداف استراتيجية بعيدة المدى. وطروحات ومسميات هي في حقيقتها أهداف يةودية وامريكية يجري تنفيذها عبر خطط ومشاريع تبدأ بمقترحات تنتهي بفرضها على ارض الواقع بشتى الوسائل حتى القوة.ومشروع الشرق الأوسط الكبير لا يختلف عن هذه الحقيقة .فبعد احتلال العراق بدأت الولايات المتحدة بطرح مشاريعها لترتيب الخارطة السياسية والاستراتيجية للمنطقة المهمة بالنسبة لها اقتصاديا واستراتيجيا وسياسيا وحتى دينيا وحضاريا, متخذة من العراق قاعدة للانطلاق والضغط على الوطن العربي والدول الاخرى التي تمثل بمجملها اطراف المشروع الامريكي القديم بولادته والجديد بطروحاته وادوات تنفيذه.وهذا ما استندنا علية في اثبات فرضيتنا التي تقوم على فكرة ان جميع الطروحات والمشاريع والترتيبات التي طرحت وما زالت تطرح للمنطقة ومسارات التغيير فيةا والذي من المفترض ان يكون نحو الديمقراطية مرتبطة تعتمد على مضامين واليات تحقيق الشرق الاوسط الكبير , والعراق له دور محوري في هذه الاجندة لان اي تغيير في العراق سيتحكم بتغيير محتمل اقليمي او عربي اخر, هذا هو المخطط الامريكي والغربي لمناطق الطاقة والثروة .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 03 2017
Journal Name
Arab Conferences Network / American Research Foundation
Understanding the nature of science among chemistry teachers according to the AAAS document for the Educational Reform Project 2061
...Show More Authors

Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Core competencies and Their Role in Enhancing Organizational flexibility: An Analytical Study of the Views of a Sample of Employees in Presidency University of Mosul
...Show More Authors

Abstract

The study aims to identify the levels of core competencies dimensions and types of organizational flexibility in the investigated organization, as well as to determine the nature of the relationship and the impact of core competencies dimensions with the process of organizational flexibility. Thus, a number of research questions were presented to express the research problem as follows:

  • What is the level of the investigated individuals' awareness to core competencies and organizational flexibility across their dimensions and types in the investigated organization?
  • To what extent are core competencies and organizational flexibility available in the Organiz

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 09 2025
Journal Name
Journal Of Economics And Administrative Sciences
The role of public relations in enhancing the quality of governmental service-a Field study in the Iraqi Airlines
...Show More Authors

View Publication
Publication Date
Thu Oct 09 2025
Journal Name
Journal Of The Iraqi University
THE ROLE OF STRATEGIC AMBIGUITY IN BUILDING THE CUSTOMER’S MENTAL IMAGE: AN EXPLORATORY RESEARCH IN THE NATIONAL INSURANCE COMPANY
...Show More Authors

View Publication
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
THE IMPACT OF OIL PRICES ON THE PUBLIC BUDGET AND TRADE BALANCE IN IRAQ FOR THE DURATION (2004-2017)
...Show More Authors

The fluctuations in oil prices in world markets affect the general budget and the trade balance of the rent countries, because oil is a strategic commodity affected by economic and political factors. The fluctuations in oil prices affect the public budgets of the rent countries through the public revenue side of oil revenues. On the other hand, these fluctuations affect the balance of trade through the volume of oil exports, which lead to imbalance of trade surplus or deficit .                                           &nbs

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
(Measuring and analyzing the impact of financial crises on the main source for financing the public budget in Iraq) *
...Show More Authors

    Form recurrence of financial crises phenomenon disturbing and attention , and returns the reasons so that its negative effects were sharp and dangerous , because of the nature and cause of Ncaha , threatened political and economic stability of the countries in which they occur these crises , in addition to Machmlh these crises spread of contagion across multiple channels to include other countries many developed and developing , and the reason for this to the openness of the economic and financial witnessed by the countries affected by crises and other countries concerned, the financial crisis is a case of financial turmoil appears in one of the sections of the financial system one and extends to

... Show More
View Publication Preview PDF
Crossref