Preferred Language
Articles
/
jcopolicy-627
The Kurdistan Workers Party (PKK) and its Impact on Iraqi National Security
...Show More Authors

The Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar  after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued survival of the Workers Party and its fighters on Iraqi lands, and their continued military operations against Turkey will force Iraq to endure the Turkish forces' raids against them under the right to follow up and use the deterrent defense measure to defend itself. This represents a breach by the Turkish side on Iraqi sovereignty and its effect on Iraqi national security. Therefore, the presence of the PKK in the Iraqi scene and its influence mean that it plays a role in the geopolitical interactions of the Iraqi state, which will in turn affect the Iraqi national security

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FAUNA AND FLORA OF HAWRAMAN MOUNTAIN (Part one) HAWRAMAN LOWEST ZONE, KURDISTAN PROVINCE NORTH EAST OF IRAQ
...Show More Authors

    In this study we try to make a first step for making a new list for fauna and flora of Kurdistan in particular and Iraq in general. This is very important study of biodiversity of Iraq. We recognize 52 migratory and resident birds including Alectoris chukar asoica which is recently described. Also, 20 amphibians and reptiles including two snakes recently recorded Zamenis hohenackeri and Platyceps ladacesis, a new form of Asaccus sp. and sub- species of Varanuns griseus caspeius for the first time in Iraq, with many rare specimens. Thirteen different species of mammals were recognized, with comme

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 29 2026
Journal Name
Karbala Journal Of Physical Education Sciences
تأثير تمرينات وقائية للذراعين في تطوير بعض القدرات البدنية للاعبي المنتخب الوطني بكرة السلة على الكراسي المتحركة
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Shift towards Digital Education According to Vision 2030 in Light of Some Variables from the Perspective of Workers with Disabilities
...Show More Authors

The current study aimed to measure the attitudes of female teachers towards the use of digital learning and the degree of possessing their digital education skills. The study sample consisted of (180) workers with disabilities (mental disability، auditory impairment، visual disability، hyperactivity and distraction. To achieve the goals of the study, the transformation measure was used towards digital education for people with disabilities. The study reached the following results: the availability of digital learning skills among workers with disabilities. The study concluded with a series of recommendations including holding Training courses to keep up with the challenges of educational trends and modern technology in this area.

View Publication Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
Ecology, Environment And Conservation
Measurement of the concentration of lead in gasoline stations and in air battery factories and their effect of cytogenetic and hematological parameter in workers
...Show More Authors

Publication Date
Sun Oct 01 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Atherogenic Indices in Type 2 Diabetic Iraqi Patients and Its Association with Cardiovascular Disease Risk
...Show More Authors

خلفية البحث: مرض السكري هو عامل خطر لأمراض القلب والأوعية الدموية وتصلب الشرايين وسبب مهم للوفاة. يرتبط خلل الدهون في الدم بشكل شائع بمرض السكري من النوع الثاني ويعتبر مؤشر تصلب الشرايين في البلازما علامة قوية للتنبؤ بخطر الإصابة بتصلب الشرايين وأمراض القلب التاجية. الهدف من البحث: دراسة ارتباط المؤشرات الدهنية لتصلب الشرايين لدى المرضى العراقيين المصابين بالسكري من النوع الثاني ولديهم أمراض قلبية وعائ

... Show More
Scopus (5)
Crossref (3)
Scopus Crossref