Preferred Language
Articles
/
jcopolicy-606
The Role of Association of Southeast Asian Nations (Asean) in Achieving Regional Security
...Show More Authors

The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of ​​regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve international peace and security, while the proponents of the regional orientation emphasized the importance of establishing regional organizations to achieve this, and from here the theory of “regional peace” arose after the World War the second. Since the capabilities of developing countries to compete are weak, many of these countries have sought to take one form or another of regional cooperation in order to enhance their economic capacity in facing these challenges. In this context, the experience of the Association of Southeast Asian Nations, known as ASEAN for short, represents a distinct model in this regard, which prompted it to be considered a model capable of being emulated by developing countries in their quest to maximize their gains in light of the contemporary international reality. Hence the importance of this research paper, which seeks to identify the factors of success or failure of the “ASEAN” experience in achieving regional security, its weaknesses, the challenges and difficulties it faces, and how to deal with them, in order to identify the extent of the possibilities of benefiting from this experience within the Arab region.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Educational And Psychological Researches
القدرة على القيادة التربوية وعلاقتها بالاتجاه العلمي لدى رؤساء الاقسام في بعض الجامعات العراقية
...Show More Authors

مشكلة البحث :

تعد الادارة الجامعية عاملا مهما واساسيا في اكمال البناء المعرفي لشخصية الطالب الجامعي لما يمثله من قدرة على قيادة العملية التربوية والتعليمية والوصول بها الى تحقيق اهدافها . وطالما كانت هذه الادارة ممثلة ابتداء من رئاسات الاقسام ووصولا الى اعلى الهرم الاداري في الجامعة مهمة في تحقيق  الاهداف العلمية والتربوية فان اختيار الاشخاص للقيام بمهامها تاخذ جانبا كبيرا ومهما وذلك للاثر

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of The College Of Languages (jcl)
Molla Mehmet Sadık'ın Kerkük'teki Eskide Bulunan Taş Köprü Adlı El Yazısının İncelemesi Açıklaması
...Show More Authors

Yaşıyan kuşağın unutulmaz aruz şairi tanınmış Hacı Mehmet Sadık. İzi
silinmez kaybin, bugünkü eski sitil şiirin gerçek sembolu olup yaşadığı bir çağa
yakın süre içinde yüzlerce ve yüzlerce beyit şiir söylemiş.
Her çevrede Türk doğup Türk yaşamak bahtıyarliğiyle övünen ozanımızın ,
seçkin bir çok şiirleri vardır.
Böylece kitap, dergi ve gazetelerde yayımlanmış sayısız şiirleri yanında
basıma hazır kitaplık şiir ve yazılarıda vardı. Gazetelerde yayımlanan şiirlerini
memleket dertlerine , değerli mert kişilerine gönüllerde yaşıyan ölülerine , yurdu
ve yurttaşı için iyilik güden devlet ve memleket büyüklerine ayırdığını
görmekteyiz.<

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 03 2011
Journal Name
Journal Of Educational And Psychological Researches
أثر التدريس بطريقة التنقيب الحواري في حفظ النصوص الأدبية لدى طلبة قسم اللغة الكردية
...Show More Authors

يهدف البحث الحالي إلى معرفة اثر التدريس بطريقة التنقيب الحواري في حفظ النصوص الأدبية لدى طلبة قسم اللغة الكردية، اختارت الباحثة طلبة المرحلة الثانية في قسم اللغة الكردية بكلية التربية ابن رشد، للعام الدراسي
(2008-2009) ميدان لتطبيق تجربتها.
تألفت عينة الدراسة من (48) طالبا وطالبة، تم توزيعها عشوائيا إلى مجموعتين، مجموعة ضابطة (درست بالطريقة الاعتيادية) تألفت من (23) طالبا وطالبة ومجموعة تجريبية (درست بطريقة الت

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Educational And Psychological Researches
مستوى التنمية المهنية لتدريسيي جامعة بغداد في ضوء مؤشرات الجودة الشاملة من وجهة نظرهم
...Show More Authors

The present study aimed to know The teaching members’ level of the professional development at the University of Baghdad based on the indicators of the overall quality from their perspective;

The researchers used the descriptive and analytical approach the in order to achieve the purposes of research, the researchers designed questionnaire researched and consisted of 40 paragraph has the questionnaire submitted to the arbitrators and experts were verify the authenticity of the questionnaire and stability have been applied questionnaire on a range of teaching and Tdriciat Baghdad University, which reached the study sample (400) teaching and teaching of six colleges in the University of Baghdad equivalent

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 22 2018
Journal Name
Arab Science Heritage Journal
اخبار أخبار الزمان في تاريخ بني العباس للخزرجي (ت812هـ) دراسة وتحقيق العصر العباسي الأول
...Show More Authors

تحيا الأمم بتراثها فهو الأساس الذي تنطلق منهُ، وما من أمة إلاّ ولها تراث، وهو سر حياتها وديمومتها ، فالأمة العربية الأسلامية لها تراث تليد التي تشرفت بحمل أقدس رسالة سماوية وأكملها لأمم الأرض، فكانت نبراساً أهتدت به البشرية حتى انتشلتها من واقعها المريض إلى أرغد عيش وأقوم خلق وأنبل نفس .

View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conf. Series
Composition, Characterization and Antibacterial activity of Mn(II), Co(II),Ni(II), Cu(II) Zn(II) and Cd(II) mixed ligand complexes Schiff base derived from Trimethoprim with8- Hydroxy quinoline
...Show More Authors

New Schiff base ligand 2-((4-amino-5-(3, 4, 5-trimethoxybenzyl) pyrimidin- 2-ylimino) (phenyl)methyl)benzoic acid] = [HL] was synthesized using microwave irradiation trimethoprim and 2-benzoyl benzoic acid. Mixed ligand complexes of Mn((ІІ), Co(ІІ), Ni(ІІ), Cu(ІІ), Zn(ІІ) and Cd(ІІ) are reacted in ethanol with Schiff base ligand [HL] and 8-hydroxyquinoline [HQ] then reacted with metal salts in ethanol as a solvent in (1:1:1) ratio. The ligand [HL] is characterized by FTIR, UV-Vis, melting point, elemental microanalysis (C.H.N), 1H-NMR, 13C-NMR, and mass spectra. The mixed ligand complexes are characterized by infrared spectra, electronic spectra, (C.H.N), melting point, atomic absorption, molar conductance and magnetic moment me

... Show More
Publication Date
Wed Sep 25 2013
Journal Name
International Journal For Sciences And Technology
Synthesis, Characterization, And Antibacterial Activities Of Manganese (II),Cobalt(II), Copper(II) ,Iron (II), Nickel (II) And Cadmium(II) Mixed- Ligand Complexes Containing Amino Acid( L- Lysine) And 1,10-Phenanthroline
...Show More Authors

The research includes the synthesis and identification of the mixed ligands complexes of M(II) Ions in general composition [M(Lyn)2(phen)] Where L- lysine (C6H14N2O2) commonly abbreviated (LynH) as a primary ligand and 1,10-phenanthroline(C12H8N2) commonly abbreviated as "phen," as a secondary ligand . The ligands and the metal chlorides were brought in to reaction at room temperature in ethanol as solvent. The reaction required the following molar ratio [(1:1:2) (metal): phen:2 Lyn -] with M(II) ions, were M = Mn(II),Cu(II), Ni(II), Co(II), Fe(II) and Cd(II). Our research also includes studying the bio–activity of the some complexes prepared against pathogenic bacteria Escherichia coli(-),Staphylococcus(-) , Pseudomonas (-), Bacillus (-)

... Show More
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (8)
Scopus Clarivate Crossref