Preferred Language
Articles
/
jcopolicy-551
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional leadership and the prevalence of different tensions between them and the increase in different alliances based on the centrality of the American and Chinese roles, which found resonance in the three-pronged and bilateral axis policies in the interactions of the security environment for the whole region.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The relationship between organizational culture and administrative creativity among colleges' deans and their assistants in Baghdad University
...Show More Authors

Generally, the academic facilities necessitate specific criteria to be under the regional standards such as creative leaders, and a positive climates that induce to create an organizational culture within the academic institution. Consequently, these variables promote to improve the educational and administrative performance pursuing to achieve the general objectives. Thus, the current research aims to explore the level of privileged organizational culture among Baghdad University Colleges, explore the administrative creativity of deans and their assistants in addition to identify the relationship between them. The researchers prepared two instruments which were distributed among (70) individual of the targeted sample to collect the requ

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 13 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment
...Show More Authors

Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Influence of the Applied Potential and Temperature on the Electrode position of the Lead Dioxide
...Show More Authors

The excellent specifications of electrodes coated with lead dioxide material make it of great importance in the industry. So it was suggested this study, which includes electrodeposition of lead dioxide on graphite substrate, knowing that the electrodeposition of lead dioxide on graphite studied earlier in different ways.

In this work the deposition process for lead dioxide conducted using electrolytic solution containing lead nitrate concentration 0.72 M with the addition of some other material to the solution, such as copper nitrate, nickel nitrate, sodium fluoride and cetyl trimethyl ammonium bromide, but only in very small concentrations. As for the operating conditions, the effect of change potential and temperature as well

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Yazyk I Kul'tura
Cognitive-communicative approach in the system of teaching Russian language for foreign students (in the condition of no language environment)
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering Science And Technology
THE INFLUENCE OF CHEMICAL COMPOSITION OF ASPHALT CEMENT ON THE PHYSICAL AND RHEOLOGICAL PROPERTIES
...Show More Authors

Failure in asphalt mixture and distress in pavement are major issues to roads infrastructure. Selecting an appropriate chemical composition of asphalt cement is a key component in avoiding these issues. This work aimed to investigate the effect of the chemical composition of different polar fractions on the rheological and physical properties of asphalt cement. Four types of asphalt cement with penetration grades of 20/30, 40/50, 60/70 and 85/100 were divided into four fractions. Complex shear modules, rutting resistance and rotational viscosity of the asphalt cement were determined by using a Dynamic Shear Rheometer and a Rotation Viscometer, respectively. The results show that an increase in the asphaltene content and Gastel index resulte

... Show More
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The influence of temperature and size on the absorption coefficient of CdSe quantum dots
...Show More Authors
Abstract<p>Because of Cadmium selenide quantum dots (CdSe quantum dots) has a tuning energy gap in the visible light range, therefore; it is provided a simple theoretical model for the absorption coefficient of CdSe quantum dots, where the absorption coefficient determines the extent to which the light of a material can penetrate a specific wavelength before it is absorbed. CdSe quantum dots have an energy gap can be controlled through two effects: the temperature and the dot size of them. It is found that; there is an absorption threshold for each directed wavelength, where CdSe quantum dots begin to absorb the visible spectrum at a size of 1.4 nm at room temperature for a directed wavelength 3</p> ... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Modeling and Analyzing the Influence of Fear on the Harvested Modified Leslie-Gower Model
...Show More Authors

A modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify the va

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (2)
Scopus Crossref
Publication Date
Mon Feb 20 2023
Journal Name
Baghdad Science Journal
Modeling and Analyzing the Influence of Fear on the Harvested Modified Leslie-Gower Model
...Show More Authors

A modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify t

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Islamic Regular Charity between The Immediacy and The Lagging
...Show More Authors

The islamic legitimacy,imposition and of al-zakkat(regular charity) are well
known matters to the whole muslims but being in love with the present life and
worldly existence and being in scare of the death made some of the moslems to lag
behind and delay of keeping with that matter (regular charity) because the mony al
wayes was the reason for the man happiness in the present life allah makes al-zakat
(regular charity) one of the granting remissionns of the moslems people sins in return
for that allah promised the moslems to honored them with the eternal life in in the
paradise where is the gardens beneath which rivers flow so that I decided to write in
this matter of couarse after trust and recommend in god and h

... Show More
View Publication Preview PDF