Preferred Language
Articles
/
jcopolicy-439
The role and effectiveness of the United Nations Security Council in light of the competition of international powers: an analytical study
...Show More Authors

Abstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under equipped blue helmets have struggled to carry out ambitious mandates while facing severe challenges in the Central African Republic, Mali, South Sudan and elsewhere, only thinly papered over by the international responses to date.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2012
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A Comparative Study of the Effects of Age and Smoking on Nail Growth Rate in Healthy Individuals
...Show More Authors

GA Al Omran, AA Noaimi, Z Al Madfai, H Al Hamamy, Journal of the Faculty of Medicine Baghdad, 2012

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Stomatology
Preferences of treatments and materials used in the management of exposed pulps: a web-based questionnaire study
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
A Comparative Study of Organic and Mineral Acids in the Release of Potassium from Potassium Feldspar Minerals
...Show More Authors
Abstract<p>A study conducted a laboratory experiment to measure the release of potassium and the dissolution of feldspar minerals in soils from different locations in Karbala Province (Ain Al-tamur, Qasr Al-Akhyar, Fadak Farm). The study involved the addition of organic acids (fulvic and humic) and mineral acids (sulfuric and phosphoric) at concentrations of 5% and 10% to sand-separated soil samples obtained through wet sieving. Feldspar minerals were identified using a polarized light microscope, and the percentage of each type of feldspar mineral was calculated. The results demonstrated that organic acids outperformed mineral acids in releasing potassium at both concentrations. Among the organ</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
Comparative study of the renoprotective effects of captopril and aminophylline against cainst cisplatin – induced nephrotoxicty in rats
...Show More Authors

Background: Cisplatin is one of the most
commonly used anti-cancer drugs , but its
clinical use was limited by its nephrotoxicity .
Methods: In this study we try to investigate the
renoprotective effect of captopril and
aminophylline against cisplatin induced
nephrotoxicity .For this purpose a 36 Sprague
Dawley rats was divided randomly to 6 groups ,
each group consist of 6 rats. The first group
given normal saline and act as control group,
while the other 5 groups given cisplatin ( 7.5
mg/kg ) , captopril ( 60 mg/kg ) , aminophylline
( 24 mg/kg ) , captopril with cisplatin and
aminophylline with cisplatin respectively. All
drugs are given as single dose through
intraperitonial route. After 6

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
The study of nonlinear optical properties of rhodamine B dye and TiO2 nanoparticles doped in PMMA polymer
...Show More Authors

In this research, A thin film of Rhodamine B dye and TiO2 Nanoparticles doped in PMMA Polymer has been prepared by a casting method. The sample was spectrum absorption by UV-Vis. The nonlinear optical properties were measured by Z- scan technique using Nd:YAG laser with (1064 nm) wavelength. The nonlinear refractive index (n2) and nonlinear absorption coefficient (β) were estimated for the thin film for different energies of the laser, n2 and β were decreased with increasing intensity of incident laser beam. Also, the type of β was two-photon absorption and n2 negative nonlinear reflective.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
The American Occupation Policy toward Japan 1945-1951 and Iraq 2003-2008: Comparative Historical Study
...Show More Authors

With their strategic and geographical positions, Japan and Iraq are one of the major
countries in the world, especially to the United States. Japan lies near the two American
Continents, separated only by the Pacific and it is only normal to have the interests of both
countries crossed and joined in the Far East region. This made the occupation of Japan an
inventible matter in the second half of the 20th century. Iraq, on the other hand, has strategic
position in the Middle East, being surrounded by many active countries like Turkey, Iran, and
Gulf countries, besides Iraq’s oil wealth which is needed by such industrial country like the
United States.

View Publication Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref