Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2015
Journal Name
Engineering And Technology Journal
Synthesized Cu (In, Ga) Se2 (CIGS) thin films and implementation as the active light absorbing material in photovoltaic devices (PVs)
...Show More Authors

This review article summarizes our research focused on Cu(In, Ga)Se2 (CIGS) nanocrystals, including their synthesis and implementation as the active light absorbing material in photovoltaic devices (PVs). CIGS thin films were prepared by arrested precipitation from molecular precursors consisting of CuCl, InCl3, GaCl3 and Se metal onto Mo/soda-lime glass (SLG) substrates. We have sought to use CIGS nanocrystals synthesized with the desired stoichiometry to deposit PV device layers without high temperature processing. This approach, using spray deposition of the CIGS light absorber layers, without high temperature selenization, has enabled up to 1.5 % power conversion efficiency under AM 1.5 solar illumination. The composition and morphology

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Arabian Gulf from the GCC countries to the EU
...Show More Authors

The Gulf Cooperation Council (GCC) is the only one in the Arab system, which has been able to formulate a strategic vision with its dimensions and objectives, and that for its great achievements have contributed significantly to the development of the external and internal economic relations of the Gulf Cooperation Council six through the consolidation of economic policies, projects and joint institutions . There is no doubt that the establishment of the Cooperation Council for the Arab Gulf States six, has made security expensive as long as the aspiration to them the leaders and peoples of the region is the adoption of the GCC countries on itself in order to build a self strength ensures cut off the road to all interference in the affai

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Social Care for the Disabled students and its influence on the Scientific Level (University of Baghdad as example)
...Show More Authors

The enrollment of students in the university represents a new stage in their life that differ from the previous educational stages that student has previously established. It should be noted that students with special needs at the University of Baghdad are not large numbers. It appears that these students have an excel role in their colleges most often, That is, the handicap was not a barrier to their scientific progress, but rather an incentive for them to excel. The most important conclusion reached by the researcher is that the University of Baghdad had no role in caring for people with special needs and caring for them financially, socially, psychologically, healthily and economically, they need to pay attention to them and take care

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
nternational will in the Security Council Towards the Syrian crisis
...Show More Authors

Nations witnessed since its existence a state of wills conflict as a result of the intersection and intertwining of interests, through which it sought to achieve its goals and objectives, and this has often led to direct military conflicts and countless wars, and witnessed the entry into global wars in which humanity lost millions of lives and losses .Despite the great changes in the international arena, especially in recent decades, the conflict of wills has not ceased, although some of its features and forms have changed, and it has become more complicated after the withdrawal of this conflict to international organizations and bodies, including the Security Council. It is mandated under the Charter of the United Nations to wor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Algerian Popular National Army ( 1962 – 19678 ): The Algerian Popular National Army ( 1962 – 19678 )
...Show More Authors

Abstract :
Algeria had lacked the appropriate size of forces that achieved to it the
military balance to face the foreign threats or to achieve its security
.Consequently , this demanded Algeria to put a complete plan to reach the
appropriate size by forces . These Forces needed to be built according to the
following standards :-
- The national gool for Algeria and how to achieve it through the armed forces
.
- Specifying the size of threats with a kind of detail , the size of these threats
would be specified in the future in order to build its Force according to Future
Frames and limits .
- Developing the abilities of war manufacturing .
- Specifying the necessary Funds in the Future budgets that woul

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protec

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 07 2012
Journal Name
Scientific Research And Essays
Security verification of the return routability protocol by Murphi
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More