Preferred Language
Articles
/
jcopolicy-487
Obstacles to reforming the Security Council and new international changes
...Show More Authors

The international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Medico-legal Update,
Histological and enzyme histochemical changes of liver induced by the action of maxxthor insecticide in male albino rats
...Show More Authors

The present study aimed to investigate the histological, enzyme histochemical changes and liver function effects of Maxxthor insecticide on albino rats in liver. The experiment included 20 rat which were divided into four groups, the first group 5 rats were considered the control animals and the others were divided equally into three groups with a dose of 0.01, 0.1and 1 mg / kg of body weight, respectively for a period 40 days. The animals given each 48 hours via oral route Maxxthor by tube dosage after dissolved with distilled water. Microscopic examination of liver showed inflammatory cell aggregation around vessels, congestion and dilation of sinusoids hepatocytes hypertrophy with severs inflammatory cells infiltration, kupffer cells pro

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Studying the Changes in Solar Radiation and Their Influence on Temperature Trend in Iraq for a Whole Century
...Show More Authors

Most studies indicated that the values ​​of atmospheric variables have changed from their general rates due to pollution or global warming etc. Hence, the research indicates the changes of direct solar radiation values ​​over a whole century i.e. from 1900 to 2000 depending on registered data for four cities, namely (Mosul - Baghdad - Rutba - Basra. Moreover, attemptsto correlate the direct solar radiation with the temperature values have been ​​recorded over that period. The results showed that there is a decreasing pattern of radiation quantities over time throughout the study period, where the value of direct radiation over the city of Baghdad 5550 w/m2 was recorded in the year 1900, but this ratio decreased cle

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Ieee Access
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN
...Show More Authors

Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat

... Show More
View Publication
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Antimicrobial Screening of New Schiff Bases Linked to Phthalimidyl Phenyl Sulfonate Moiety
...Show More Authors

A series of Schiff bases linked to phthalimidyl phenyl sulfonate moiety have been synthesized via multistep synthesis. The first step involved reaction of phthalic anhydride with aniline producing N-phenyl phthalamic acid which was subsequently dehydrated to the corresponding N-phenyl phthalimide via treatment with acetic anhydride and anhydrous sodium acetate. The synthesized imide was treated with chlorosulfonic acid in the third step producing 4-(N-phthalimidyl) phenyl sulfonyl chloride which was introduced in reaction with 4-hydroxy acetophenone in the fourth step producing 4-[4-(N-phthalimidyl) phenyl sulfonate] acetophenone and this in turn was introduced successfully in condensation reaction with various aromatic primary amines affor

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jul 25 2024
Journal Name
Journal Of Administration And Economics
ادارة الاحتواء العالي وتأثيرها في سلوك العمل الاستباقي: بحث تحليلي في مجلس محافظة بغداد
...Show More Authors

يهدف البحث الحالي الى اختبار علاقة الارتباط والتأثير بين إدارة الاحتواء العالي وسلوك العمل الاستباقي ، ومن اجل تحقيق ذلك تم اختيار مجلس محافظة بغداد ميداناً لتطبيق البحث، وشمل البحث متغيرين إدارة الاحتواء العالي عبر ابعاده الفرعية )ممارسات التطوير، المكافآت، مشاركة المعلومات، التمكين(، وسلوك العمل الاستباقي عبر ابعاده )تولي المسؤولية، صوت الموظف، المبادرة الشخصية(، وضمت عينة البحث ) 97 ( فرداً من الموظفين ا

... Show More
View Publication
Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (8)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (10)
Crossref (7)
Scopus Crossref