Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Mobility Models over UDP Traffic Pattern for MANET Using NS-2
...Show More Authors

  The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes,  different traffic rates, different traffic sources, different pause times and different simulation times .  A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Caroll’s Pattern on the Second Intermediate Class Pupils' Achievement in Geography
...Show More Authors

The present study aims at finding out the (effect of the Caroll’s pattern on the second intermediate class pupils' achievement in geography)

The partial experimental design of two groups, experimental and control, with pre-post tests is used. The sample is represented in (74) female pupils. The sample is divided into two groups (38) experimental group and (36) control one. The sample is selected from first intermediate  class pupils    ( Am Salama Secondary School for girls) \ Baghdad\ Al-karkh-1, for academic year 2015-2016.

The researcher has equalized the two groups in several variables: the previous achievement tests, intelligence, age in months, the scor

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Iraq and the US-Iranian conflict, influence and influence
...Show More Authors

Iraq enjoys many factors and ingredients that made it “affect and be affected at the same time” by the American-Iranian conflict from the “strategic geographical position” adjacent to Iran as an important point and that Iraq has been part of this conflict since the last period which witnessed the outbreak of the first Gulf War  (1980-1988)  because of border problems and a dispute over Shatt al-Arab, and what followed after that, specifically from 2003 when the United States of America and its allies occupied Iraq’s lands and made a political change by the destruction of its security and military institutions. It increased the importance of Iraq in being a subject of competition between the competing parties in exploiting the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Der Pharma Chemica
Synthesis, characterization and biological evaluation of new potentially active hydrazones of naproxen hydrazide
...Show More Authors

To synthesize new hydrazone derivatives of naproxen with enhanced anti-inflammatory activity and devoid the ulcerogenic side effects. Hydrazones were synthesized by conjugation of naproxen hydrazide with seven natural and synthetic aldehyde and ketone by using glacial acetic acid as catalyst. The synthesis has been carried out following simple methodology in excellent isolated yields.The structure of the synthesized derivatives has been characterized by elemental microanalysis (CHN), FTIR Spectroscopy, and other physicochemical properties.The anti- inflammatory activity of the synthesized compounds was evaluated in vivo using the egg-white induced edema model in rats, and the results of the biological assay was found to be comparable to Nap

... Show More
View Publication Preview PDF
Scopus (15)
Scopus
Publication Date
Thu Dec 28 2023
Journal Name
مجلة الجامعة العراقية
The emergence of the Vietnamese National Movement in China 1921-1946
...Show More Authors

The research, which was drawn from his doctoral thesis (People's Policy towards Vietnam 1949-1979), discussed the roots of the connections between the Chinese and Vietnamese communists since the 1920s, the presence of Ho Chi Minh and other Vietnamese communists in China, their influence by the revolutionary struggle of the Chinese Communist Party and their establishment of a group of The Vietnamese Revolutionary Societies and the Indo-Chinese Communist Party until the outbreak of the Vietnamese Revolution and their success in declaring the establishment of the Democratic Republic of Vietnam in 1946. Keywords: Ho Chi Minh, Chinese Communist Party, Indo-Chinese Communist Party, Democratic Republic of Vietnam, Chou En Lai.

View Publication Preview PDF
Publication Date
Mon Dec 01 2025
Journal Name
Multidisciplinary International Journal
Amanda Gorman: The National Young Poet Laureate of the African Diaspora
...Show More Authors

The current study examines the poetry) free verse( of African American Amanda Gorman in the light of the African diaspora concept, with a focus on themes of migration, African American identity, and cultural interactions. Additionally, the chosen poems discussed poets who resided in or outside of Africa, their native continent. The importance of this study lies in the fact that it sheds light on an axis that has been ignored in criticism of Gorman's poems —specifically, the axis of the African diaspora—rather than just feminism and marginalization. The purpose of this research is to emphasize the value and impact of leaving one environment to live in another, which takes adaptability, patience, and fortitude to finish the journey of lif

... Show More
Preview PDF
Publication Date
Tue Jul 15 2025
Journal Name
Smart Innovation, Systems And Technologies
The Role of the European Economic Security Strategy in Managing Economic Risks
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Our Dermatology Online
Treatment of active acne vulgaris by chemical peeling using 88% lactic acid
...Show More Authors

KE Sharquie, AA Noaimi, EA Al-Janabi, Our Dermatology Online, 2014 - Cited by 11

View Publication