Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Iraqi Postgraduate Medical Journal
Femal pattern alopecia and lipoproteins
...Show More Authors

KE Sharquie, AA Noaimi, HA Salman, NA Hindy, Iraqi Postgraduate Medical Journal, 2009 - Cited by 1

View Publication
Publication Date
Thu Oct 01 2009
Journal Name
Journal
Female pattern alopecia and lipoproteins
...Show More Authors

S Khalifa E, N Adil A, S Husam Ali, H Nibras A…, 2009

View Publication
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The phenomenon of military governments in the Arab countries
...Show More Authors

The modern nation state, by virtue of its institutional nature, is divided into political and non-political institutions according to their respective jurisdictions. It is natural for non-political institutions to perform their functions under the control of the political establishment, for two reasons: first, Second: Ensuring the achievement of cooperation, harmony and integration between these different institutions in serving the stability of the society and its continuity and achieving its supreme objectives. The location of the military establishment is part of the non-political institutions of the state, since it carries out a non-political function that is based on defending the homeland against any threats that may threaten its s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Comparison between Horizontal and Vertical OFETs by Using Poly (3-Hexylthiophene) (P3HT) as an Active Semiconductor Layer
...Show More Authors

In this paper, a comparison between horizontal and vertical OFET of Poly (3-Hexylthiophene) (P3HT) as an active semiconductor layer (p-type) was studied by using two different gate insulators (ZrO2 and PVA). The electrical performance output (Id-Vd) and transfer (Id-Vg) characteristics were investigated using the gradual-channel approximation model. The device shows a typical output curve of a field-effect transistor (FET). The analysis of electrical characterization was performed in order to investigate the source-drain voltage (Vd) dependent current and the effects of gate dielectric on the electrical performance of the OFET. This work also considered the effects of the capacitance semiconductor on the performance OFETs. The value

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Jan 05 2012
Journal Name
International Journal Of Scientific Research
The Influence of Parsley ( Petroselinum crispum ) as Feed Additive on Hematological Traits of Local Iraqi Geese
...Show More Authors

This study was conducted to investigate the effect of feeding diets containing different levels of parsley on the hematological traits of local Iraqi geese. A total of twenty-four local geese, one year old, were used in this experiment. The birds were allocated into four treatment groups, consisting of six geese each. Treatment groups were: control diet (C) (free from parsley); T1: control diet + 80 g/d parsley; T2: control diet + 160 g/d parsley; and T3: control diet + 240 g/d parsley. At the end of the experiment, blood samples were obtained from all geese from the brachial vein by venipuncture. Hematological traits included in this study were red blood cells count (RBC), hemoglobin concentration (Hb), packed cell volume (PCV), mean cell

... Show More
Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Materials Science: Materials In Electronics
Influence of manganese concentration on photoelectrochemical response of TiO2 nanotube decorated with Mn/CdS as photoanode
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
The impact of Jurisprudence Rules in Addressing Contemporary security Challenges
...Show More Authors

The impact of Jurisprudence Rules in Addressing Contemporary security Challenges

Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and pre

... Show More
View Publication Preview PDF
Crossref