Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Characteristics and pattern of organizational structure for general inspectors offices :Testing Research
...Show More Authors


    
Concentrated research topic in addressing variable vital to the work of offices of inspectors general, construction and scale effectiveness and efficiency is the organizational structure, which are important as is obvious to any researcher in the management and organization and this variable would affect the exercise task supervision and inspection of financial and administrative corruption and combat efficiently, Thus this effect will be placed in the fold ability to achieve goals. That the creation of the organizational structure and requirements to achieve harmony between its properties is creating step towards success. This research aims to analyze the characteristics and style o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Prescribing pattern of antibiotics in AL-Elwia Pediatric Teaching Hospital, Baghdad, 2016.
...Show More Authors

Background: Antibiotics are among the most commonly used medicine, in both community and hospital setting, all over the world especially in countries where no strict guideline to regulate their use. In Iraq, only a few studies conducted to describe the antibiotic prescription pattern in general hospitalsand even less in pediatric hospital.

Objective: To describe the patterns for antibiotics used in Elwia pediatric teaching hospital in Baghdad, Iraq

Type of the study: Descriptive cross sectional study.

.Methodology: The study was conducted at AL-Elwia Pediatric Teaching Hospitalduring the year 2016. A random sample from all the prescriptions sheets

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
International rights to enhance the active participation of Iraqi youth
...Show More Authors

After the democratic transformation in 2003 in Iraq, young people waited a lot to take their real opportunity to participate in politics, but most of the laws regulating political and electoral work have been unfair to young people, despite developments in laws and legislation, but opportunities did not allow young people to participate in politics, which was reflected It negatively affected their participation in voting and nomination, and even their assumption of public office and positions, which is why they complained about the ruling class and the political system through protests, or when they refused to vote, and this is reflected in the recent parliamentary elections and low participation rates

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Iraqi Journal Of Hematology
Detection of active human cytomegalovirus in patients with multiple myeloma
...Show More Authors
Abstract:<sec><title>BACKGROUND:

Human cytomegalovirus (HCMV) infection is ubiquitous and successfully reactivated in patients with immune dysfunction as in patient with multiple myeloma (MM), causing a wide range of life-threatening diseases. Early detection of HCMV and significant advances in MM management has amended patient outcomes and prolonged survival rates.

OBJECTIVES:

The aim of the study was to estimate the frequency of active HCMV in MM patients.

MATERIALS AND METHODS:

This is a case–control study involved 50 MM patients attending Hematology Center, Bag

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Oct 18 2018
Journal Name
Applied Bionics And Biomechanics
Active Impedance Control of Bioinspired Motion Robotic Manipulators: An Overview
...Show More Authors

There are two main categories of force control schemes: hybrid position-force control and impedance control. However, the former does not take into account the dynamic interaction between the robot’s end effector and the environment. In contrast, impedance control includes regulation and stabilization of robot motion by creating a mathematical relationship between the interaction forces and the reference trajectories. It involves an energetic pair of a flow and an effort, instead of controlling a single position or a force. A mass-spring-damper impedance filter is generally used for safe interaction purposes. Tuning the parameters of the impedance filter is important and, if an unsuitable strategy is used, this can lead to unstabl

... Show More
View Publication
Scopus (65)
Crossref (54)
Scopus Clarivate Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Al–bahith Al–a'alami
Public Attitudes Towards National Issues in Interactive Television Programs
...Show More Authors

This research aims to investigate the extent to which the Iraqi audience relies on interactive television programs as a source of information regarding national issues and their resulting impacts. It seeks to identify the types and nature of attitudes developed among the public towards national issues through these programs and determine the prominent topics and issues highlighted to the audience. The researcher employed a field survey as the primary research method, employing a questionnaire for data collection along with scientific observation and the Likert three-point scale to measure attitudes. The study was guided by the media dependency theory. A sample of 520 questionnaires was distributed to residents in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 14 2018
Journal Name
Arab Science Heritage Journal
حديث حديث الحـب والدموع فـي الشـعر الأندلــسي (عـصر الطـوائف)
...Show More Authors

The research study concerns the tears in the poetry of love in Andalusia has been prying analysis of poetic texts  which employed the poet of the word tears and on its behalf of crying and sadness

View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More