Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The concept of forming the living space in the American strategic thought has an
important position it is regarded as an strategic movement that it supports the American
United States with the huge capabilities in its own concern that enables it to approach of
American administration , we find that of different historical periods it works to establish that
the geopolitical dimension which is accompanied with the ability of American response for
the evens that in its own turn enables the American united states to seize the growing chances
in the global strategic environment This study includes five chapters :
- Chapter one: The idea of living space.
- Chapter two: Geopolitical dimension of living space theory.
-
Objectives: To determine Smartphone addiction among primary school students and its impacts. The samples of the study were240primary school students in derived from stratified random sampling. The questionnaire was used to collect the data. The data were then an- analyzed using correlation statistics. It also caused a negative impact on demic performance of the primary school students.
Methodology: A cross- sectional study in assessment approach in applied in order to achieve the earlier stated objectives. The study was initiated from October 1st, 2019 to April 30th, 2020. Simple random sampling (probability) sample of (240) Pupils study In primary school at Al-Rusafa first directorate schools in Baghdad City.
Results: The study re
The contemporary art culture is considered a resultant of preceding human civilizations from the early days. At the same time, it got closer to the local privacy, because the contemporary Iraqi potter worked hard to create new art, refusing to base his art on the early works, creating art pieces that contains properties to inherited art and their form significance, in order to create a new identity of his own, bringing an empowerment to his deepened civilization, with the goal to create national identity ideas from one hand, and entity and locality from another. Europeans also followed the direction of our civilization, such as (Picasso, Henry Moore, Barbra Hurth, Brankouzi, Hans Arp,..etc). From this point of view comes the importance o
... Show MoreThis competition between competing forces, organized into axes with conflicting objectives, is reflected in all regional affairs and the goals and interests of countries within them, including Iraq. Among the most important aspects impacted by the repercussions of international and regional competition in the region is Iraqi national security, based on its vital importance in preserving the sovereignty and entity of the Iraqi state, protecting the interests and cohesion of the state and people, ensuring and defending their present and future, and interacting with various regional and international activities. The Kurdistan Region, as an important part of Iraq with its own unique characteristics, may be one of the most important regi
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreParasitic diseases can affect infection with COVID-19 obviously, as protective agents, or by reducing severity of this viral infection. This current review mentions the common symptoms between human parasites and symptoms of COVID-19, and explains the mechanism actions of parasites, which may prevent or reduce severity of this viral infection. Pre-existing parasitic infections provide prohibition against pathogenicity of COVID-19, by altering the balance of gut microbiota that can vary the immune response to this virus infection.
To achieve the goals, the researcher followed the design of equal and independent groups of partial control and post-test . The research has chosen the Institute of Fine Arts in the area Almansour area as deliberate sample where three sections of students have been chosen and the number of students is (69) students. The researcher conducted equivalence in the variables (age, and IQ , and the overall rate for grade III). in diagnostic phase, (21) concepts of alternative image out of (46) concepts have been identified in addition to the goals of formulation of acquisition concepts according to the three processes (definition, discrimination and application). Achievement test has been
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreS Khalifa E, N Adil A, S Husam Ali, H Nibras A…, 2009