Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 29 2023
Journal Name
International Journal Of Applied Mechanics And Engineering
Fuzzy logic control of active suspension system equipped with a hydraulic actuator
...Show More Authors

In this paper, the Active Suspension System (ASS) of road vehicles was investigated. In addition to the conventional stiffness and damper, the proposed ASS includes a fuzzy controller, a hydraulic actuator, and an LVDT position sensor. Furthermore, this paper presents a nonlinear model describing the operation of the hydraulic actuator as a part of the suspension system. Additionally, the detailed steps of the fuzzy controller design for such a system are introduced. A MATLAB/Simulink model was constructed to study the proposed ASS at different profiles of road irregularities. The results have shown that the proposed ASS has superior performance compared to the conventional Passive Suspension System (PSS), where the body displacemen

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Trends of University Professors towards the Role of Social Networking Websites in Shaping Public Opinion about the Security Crises
...Show More Authors

Social networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the ques

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The evaluation of the procedures of excution the national strategy of unti - corruption in Iraq (2014-2010)
...Show More Authors

    Corruption has become the subject of great interest, and the subject of research and scrutiny in recent years, because of its penetration in all fields of life,  whether these fields are political, economic, social, and administrative. It is one of the biggest challenges and problems that are facing communities. Therefore, this study is focused on the evaluation of measures implementing the national strategy to combat corruption in Iraq.

This study was launched, first because of its intellectual dimensions to ensure a conceptual presentation of the strategy and operational management in general with a special focus on the processes of implementation and control str

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2006
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تقييــم ضريبـة نقـــل ملكيـة العقـــار: بحـث تطبيقــي فـي الهيئـة العامــــة للضـرائب
...Show More Authors

تحتل ضريبة الدخـل على نقل ملكية العقار خصوصية  عن بقية مصادر الدخل الاخرى وذلك لكونها تفرض على نقل ملكية العقار ومنافعه , حيث كانت تفرض الضريبة بموجـب قانون ضريبة الدخل رقم 113 لسنة 1982 والذي جاء هذا القانون غير بعيد عن مضمـون القانون رقم 95 لسنة 1959 وأهم مايلاحظ عليه بالنسبة لأرباح نقل ملكيـة العقـار أو نقل حق التصرف فيه هو أن الربح أو الخسارة الناتجة عن بيع العقار المسبوق بشراء يتـم عـن طريق القيمة أو البدل أي

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Cognitive Conflict Strategy in Comprehending Reading Among the Fifth Literary Students in the Subject of Literature and Texts
...Show More Authors

The aim of the current study is to identify the effectiveness of cognitive conflict strategy in comprehending reading among literary fifth students in literature and literature texts. The researcher uses experimental method with partial control. The sample consisted of (80) students distributed into control and experimental groups. The scientific material, the behavioral goals, the teaching plans, and the instrument of the research have been prepared (reading comprehension test) by the researcher.

The instrument's validity and reliability have been calculated and then applied to the sample. After treating the data statistically by using SPSS, the results have revealed that there is a statistically significant difference at the si

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 03 2011
Journal Name
Journal Of Educational And Psychological Researches
The effect of critical listening in teaching reading on developing students critical thinking at Kurdish Language Department
...Show More Authors

Students' passive listening to their teacher's reading is one of main
reasons behindtheir weakness in the reading skill which in its turn may
hinderachieving the in desired objectives.
When exploiting critical thinking, which will lead to deeper
understanding of the intellectual content, in learning and accurate and
correct students' outcomes.
Active listening allows paying attention to the speaker, asking him,
arguing with him, judging what he says, and making decision on what
he says. For this reason, the researcher felt the need for preforming a
study to identify the effect of critical listening on developing students'
critical thinking at reading in the Kurdish language department.
The researcher has

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 15 2025
Journal Name
Smart Innovation, Systems And Technologies
The Role of the European Economic Security Strategy in Managing Economic Risks
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Arabian Journal Of Geosciences
Effect of well scheduling and pattern on project development management in unconventional tight gas reservoirs
...Show More Authors

The advancements in horizontal drilling combined with hydraulic fracturing have been historically proven as the most viable technologies in the exploitation of unconventional resources (e.g., shale and tight gas reservoirs). However, the number of fractures, well timing, and arrangement pattern can have a significant impact on the project economy. Therefore, such design and operating parameters need to be efficiently optimized for obtaining the best production performance from unconventional gas reservoirs. In this study, the process of selecting the optimal number of fractures was conducted on a section of a tight gas reservoir model (based on data from the Whicher Range (WR) tight gas field in Western Australia). Then, the optimal number

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Oct 13 2022
Journal Name
Computation
A Pattern-Recognizer Artificial Neural Network for the Prediction of New Crescent Visibility in Iraq
...Show More Authors

Various theories have been proposed since in last century to predict the first sighting of a new crescent moon. None of them uses the concept of machine and deep learning to process, interpret and simulate patterns hidden in databases. Many of these theories use interpolation and extrapolation techniques to identify sighting regions through such data. In this study, a pattern recognizer artificial neural network was trained to distinguish between visibility regions. Essential parameters of crescent moon sighting were collected from moon sight datasets and used to build an intelligent system of pattern recognition to predict the crescent sight conditions. The proposed ANN learned the datasets with an accuracy of more than 72% in comp

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref