Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 27 2019
Journal Name
Political Sciences Journal
Effects of Neighboring Countries on the Iraqi Parliament Performance after 2003
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
Ruling on dealing with Jews in Muslim countries
...Show More Authors

Praise be to God, who is satisfied with Islam as our religion, “He opened a clear conquest for us,” and whoever works with us through the Shari’ah works and protects us. And that our master and Mawlana Muhammad His servant and Messenger is a prophet who has been merciful and compassionate. "
And after:
The occupation of Iraq and the accompanying bone events, and the following severe obstacles, resulted in a set of problems that require legitimate stances, and satisfactory answers, remove confusion and delusion, amid the clash of opinions and contradictions of jurisprudence. Work and application.
Among the difficult problems that surfaced in light of the new political developments on the land of Iraq: (the ruling on dealing

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 26 2018
Journal Name
Arab Science Heritage Journal
حقوق حقوق المرأة فـي حضارة وادي الرافدين
...Show More Authors

Centered importance of this study about the reality of women`s rights in ancient Iraq, showing the eagerness of kings and rulers in that period to formulation the laws and reforms inorder to ensure the rights of the parish of men, women and children and slaves and foreigners, with a focus on women's right to secure and protect their rights and not to be exploited, as n assential President element  in the formation of the family, and then the humanitarian community.

View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Spatiotemporal Modeling in Wireless Communication Networks
...Show More Authors

This study aims to analyze the flow migration of individuals between Iraqi governorates using real anonymized data from Korek Telecom company in Iraq. The purpose of this analysis is to understand the connection structure and the attractiveness of these governorates through examining the flow migration and population densities. Hence, they are classified based on the human migration at a particular period. The mobile phone data of type Call Detailed Records (CDRs) have been observed, which fall in a 6-month period during COVID-19 in the year 2020-2021. So, according to the CDRs nature, the well-known spatiotemporal algorithms: the radiation model and the gravity model were applied to analyze these data, and they are turned out to be comp

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication
Publication Date
Wed Sep 18 2013
Journal Name
Advanced Materials Research
Artistic Influences Analysis of Iraqi National Costumes
...Show More Authors

There were signs of the first civilization known to humanity for more than 6000 years BC in the north of Iraq have disappeared this civilization to appear after 500 years in southern Iraq, the Sumerian civilization, which was considered as the opinion of scientists or civilizations, exceeds the impact to Asia and the countries that had been in contact (Sumerians) and see them today in other towns and villages. In subsequent periods of time appeared distinct personalities to their nature, religious, social, special clothing with clothes seem especially long. And usually dress is made from raw wool material making them in the Sumerian era. Put the garment on the body and leaves the top of the right shoulder with the survival of an ope

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Al-academy
Deploying of Animatic in TV Drama: محمد ثائر البياتي
...Show More Authors

This research laid the recruitment & use of IT Animatic digital TV drama & inviting ways of working is simple &effective in the level of producing images especially in TV drama, so the entry of this technology has created the concepts of new technology, and simple & effective at the same time with high level of modernity & technical innovation, this research deals with three chapters that includes two topics the animatic modes & the stages of production , & what is the atheistic aspects that is provided by this technology with the researcher reviewing the use of some TV dramatic Production series that was mentioned through this research.Which afterwards the researcher has analyzed a sample that was selected fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Characterization of Maximal Outerplanar-Open Distance Pattern Uniform Graphs
...Show More Authors

Let A ⊆ V(H) of any graph H, every node w of H be labeled using a set of numbers; , where d(w,v) denotes the distance between node w and the node v in H, known as its open A-distance pattern. A graph H is known as the open distance-pattern uniform (odpu)-graph, if there is a nonempty subset A ⊆V(H) together with  is the same for all . Here  is known as the open distance pattern uniform (odpu-) labeling of the graph H and A is known as an odpu-set of H. The minimum cardinality of vertices in any odpu-set of H, if it exists, will be known as the odpu-number of the graph H. This article gives a characterization of maximal outerplanar-odpu graphs. Also, it establishes that the possible odpu-number of an odpu-maximal outerplanar graph i

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref