Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Optical Character Recognition Using Active Contour Segmentation
...Show More Authors

Document analysis of images snapped by camera is a growing challenge. These photos are often poor-quality compound images, composed of various objects and text; this makes automatic analysis complicated. OCR is one of the image processing techniques which is used to perform automatic identification of texts. Existing image processing techniques need to manage many parameters in order to clearly recognize the text in such pictures. Segmentation is regarded one of these essential parameters. This paper discusses the accuracy of segmentation process and its effect over the recognition process. According to the proposed method, the images were firstly filtered using the wiener filter then the active contour algorithm could b

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 17 2015
Journal Name
Monthly Notices Of The Royal Astronomical Society
Line and continuum variability in active galaxies
...Show More Authors

View Publication
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-kindy College Medical Journal
Clinical and Doppler Study of Restrictive Filling Pattern in Patients with Dilated Cardiomyopathy
...Show More Authors

Background: Dilated cardiomyopathy (DCM) is a well-recognized cause of cardiovascular morbidity and mortality.Objectives: To evaluate the prognostic implications of the restrictive left ventricular filling pattern (RFP) in dilated cardiomyopathy.Methods: Patients with DCM admitted to Ibn AL-Bitar Hospital for Cardiac Surgery, Baghdad-Iraq, from May 2006 to August 2008, underwent a full clinical evaluation and Doppler echocardiography study. Patients were classified into three groups: Group I had persistent restrictive filling pattern; Group II had reversible restrictive filling pattern; and Group III had nonrestrictive filling pattern. Results: The current study was conducted on a total number of 80 patients with DCM, fifty (62.5 %) were

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Al-kindy College Medical Journal
Pattern of Congenital Heart Disease In Children Attending Central Teaching Pediatric Hospital, Baghdad
...Show More Authors

Background: Congenital cardiac defects have a wide spectrum of severity in infants. About 30-40% of patients with congenital cardiac defects will be symptomatic in the 1st year of life, while the diagnosis was established in 60% of patients by the 1st month of age.

Objectives: To identify the occurrence of specific types of CHD among hospitalized patients and to evaluate of growth of patients by different congenital heart lesions.

Methods: A retrospective study, done on ninety-six patients (51 male and 45 female) with congenital heart disease (CHD) admitted to central teaching hospital of pediatrics, Baghdad from 1st September 2009 to 30

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 13 2019
Journal Name
Political Sciences Journal
Community composition of India and its impact on national unity
...Show More Authors

India is today the largest democratic state in the Third World and has been able to maintain its national unity in the near future. The history of Indian civilization is more than 5,000 years old. It has achieved its heritage, culture, philosophy, traditions, national unity and unity and has taken its place among nations seeking progress and progress. Which are still visible to the present day, because of their history of civilization and achievements, and the fusion of cultures of invading peoples over the centuries with the culture of diverse Indian society, but despite being a secular state, Has put into place through its governments various forms of exclusion and marginalization towards the people of India, especially Muslims, and th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
National – cultural specificity of phraseological units: Национально - культурная специфика фразеологизмов
...Show More Authors

        The present article studies the specific cultural features contained in phraseological units. The problem is approached through three different levels:

  1. The modern linguistic meaning.
  2. Lexical components of phraseological units.
  3. The first variables of linguistic units.

  The paper emphasizes the gradual process of the cultural charge in the semantic structure of phraseological units.      

       Наша Статья посвящена вопросам анализа национ-ально - культурной сп

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Public Health In Practice
Can developing countries face novel coronavirus outbreak alone? The Iraqi situation
...Show More Authors

View Publication
Scopus (30)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF