Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
Overlapping international positions United State and Russian Federation towards the Syrian crisis
...Show More Authors

Abstract: Due to the geopolitical importance of Syria in the Middle East region, which constitutes the captain's egg in regional and international balances, which made it a battleground, specifically after 2011 through the outbreak of the Syrian revolution and exacerbation was significantly to form an international crisis, and the emergence of intense regional competition. A broad regional polarization, the main objective of which is the uniqueness of regional leadership among the regional leaders of the region's leadership (Iran, Israel, Turkey, Saudi Arabia), It has taken a wide turn which resulted in a significant development in political events, which led to the failure of regional influential poles in the region to contain the crisi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 14 2022
Journal Name
Al-academy
Visual stimulus in the design of interior spaces
...Show More Authors

The visual stimulus is the effective force in visual attraction that achieves visual and perceptual co-optation and is important in wooing the recipient, and many procedural processes in the design are interpreted on it as the visual stimulus achieves visual comfort and a sense of pleasure and gives (place) the interior space a transformation in its plastic structure as well as arousing attention through The kinetic rhythm and the formal diversity, which increases the possibility of breaking the routine and traditional constraints of design patterns through the coating and encapsulation of the vertical and horizontal levels . Thus, the research problem was launched based on the following question: What are the stimuli of the visual stimu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Revue Académique De La Recherche Juridique
Consent in Reality TV Program Contracts – A Legal Study in Light of the American Experience
...Show More Authors

The development of the television industry has led to the emergence of a new type of entertainment program in which producers have abandoned stereotypes in traditional programs, known as (Reality TV show). This type of program has spread rapidly in America, (where there are more than 40 series of these programs), as well as Europe and more than twenty countries around the world, including the Arab countries, where the number of these programs today to about 1000 programs and the number is increasing , Especially with the readiness of the production networks to produce more of these programs for the huge profits they derive from them (because of the high viewing rates and the large number of ads broadcast through them) in return for low prod

... Show More
View Publication
Publication Date
Thu Mar 03 2022
Journal Name
Trends In Sciences
Computational Study of Charge Density Produced in N2: H2 Plasma Actuator
...Show More Authors

Numerical simulation of charge density produced in plasma actuators is dependent upon the development of models dealing with electrical properties. The main aim of this work is to investigate the characteristics surface charge density and space charge density of DBD plasma actuator. A simple design of surface dielectric barrier discharge plasma actuator is used in the study. The discharge gas was N2:H2 mixture with applied voltage equal to 1.5 kV. A theoretical plasma model is used to establish the charge density details. Results show that surface charge density increased in value and spread in width alone the exposed electrode as the voltage increased and reached to the amplitude value.

Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Block Method for SolvingState-Space Equations of Linear Continuous-Time Control Systems
...Show More Authors

This paper presents a newly developed method with new algorithms to find the numerical solution of nth-order state-space equations (SSE) of linear continuous-time control system by using block method. The algorithms have been written in Matlab language. The state-space equation is the modern representation to the analysis of continuous-time system. It was treated numerically to the single-input-single-output (SISO) systems as well as multiple-input-multiple-output (MIMO) systems by using fourth-order-six-steps block method. We show that it is possible to find the output values of the state-space method using block method. Comparison between the numerical and exact results has been given for some numerical examples for solving different type

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 01 2010
Journal Name
Iraqi Journal Of Physics
Determination of Skip Entry Trajectories for Space Vehicles at Circular and Super Circular Speeds
...Show More Authors

The study of entry and reentry dynamics for space vehicles is very important, particularly for manned vehicles and vehicles which is carry important devices and which can be used again. There are three types for entry dynamic, ballistics entry, glide entry and skip entry. The skip entry is used in this work for describing entry dynamics and determining trajectory. The inertia coordinate system is used to derive equations of motion and determines initial condition for skip entry. The velocity and drag force for entry vehicle, where generate it during entry into earth’s atmosphere are calculated in this work. Also the deceleration during descending and determining entry angles, velocities ratio and altitude ratio have been studied. The c

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 12 2024
Journal Name
دراسات دولية
Towards formulating a new social contract: The political system in Iraq: the dialectic of continuity and permanence
...Show More Authors

The social contract represents a set of laws and determinants agreed upon by a group of individuals in order to organize society for the better.This agreement guarantees them to live in peace according to the pre-agreed laws, and on the basis of that, it represents the key to resolving the crisis relations between the state and society, and this is what prompted Iraqi society to move towards the formulation of a new social contract through popular protest movements in 2019.To overcome the old social contract that shook the trust between the state and society as a result of its negative outputs at various political, economic and social levels, and many problems emerged that hindered the process of building the social contra

... Show More
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
The effect of different flooding ratio on Al-Shuwaija marsh
...Show More Authors

In this research, the effect of changing the flood level of Al-Shuwaija marsh was studied using the geographic information systems, specifically the QGIS program, and the STRM digital elevation model with a spatial analysis accuracy of 28 meters, was used to study the marsh. The hydraulic factors that characterize the marsh and affecting on the flooding such as the ranks of the water channels feeding the marsh and the degree of slope and flat areas in it are studied. The area of immersion water, the mean depth, and the accumulated water volume are calculated for each immersion level, thereby, this study finds the safe immersion level for this marsh was determined.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The possibility using of Accounting Information in Rationalizing the Decisions of Capital Expenditure (A case study: Companies Listed in Khartoum Stock Exchange)
...Show More Authors

The research aims at the identity of the accounting information and its characteristics, and then to study the possibility of using accounting information in rationalizing the decisions of capital expenditure. The study relied upon the descriptive analytical approach it is suitable to the nature of this study, the hypotheses of the study were tested by using a number of statistical methods by relying on statistical package program (SPSS), and the research concluded that the companies listed in Khartoum Stock Exchange using accounting information in the comparison between investment alternatives available and estimating the number of years required to recover of the investment cost, the challenges that cause weakness in using the

... Show More
View Publication Preview PDF
Crossref