Preferred Language
Articles
/
jeasiq-2120
Enhancing national security through foreseeing the economic intelligence system in Iraq
...Show More Authors

 

         Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the possibility of exploring future possibilities

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
ما خالف به الامامُ ابن السبكي الامامَ الامدي في تشنيف المسامع باب القياس انموذجا
...Show More Authors

The idea of ​​the research at first was to find out about the rare occurrence, which is the occurrence of a violation in the same madhhab and between two Shafi’i scholars such as Al-Amadi and Ibn Al-Subki. The scholarly had some brief and then moved on to the fundamentalist violations that occurred between them in the syllabus of the hearing within the chapter on analogy exclusively. The diffuse division (within the sounding and division) of the observer and the debates, or is it confined to the beholder without the debates, Imam Al-Amadi sees the inadmissibility of analogy with the reasons, while Imam Ibn Al-Subki argues that it is permissible, and Imam Al-Amdi sees that the widespread division is an argument for the observer (Muj

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
أثر برنامج تدريبي لمدرسي الكيمياء على وفق جانبي الدماغ معا في التحصيل الدراسي لطلبتهم
...Show More Authors

 This research aims to investigate the impact of a training program for teachers of chemistry according to the strategies for both sides of the brain together in academic achievement for their students, the sample consisted of a 12 teachers of both genders who are teaching chemistry for the students of the fifth scientific secondary schools of the General Directorate for the Education in Garmiyan/Sulaymaniyah governorate, Iraqi Kurdistan region, where five teachers of them randomly selected to involve the training program, and seven teachers did not participate in the proposed training program, where a sample of students was selected for each group of teachers about 147 male and female students for teachers of the experiment

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 31 2020
Journal Name
مجلة العلوم النفسية
اثر انموذج التفكير النشط في تحصيل طلاب الصف الثاني المتوسط لمادة العلوم وتفكيرهم البصري
...Show More Authors

ان الهدف من هذا البحث هو التعرف على أثر انموذج التفكير النشط في تحصيل طلاب الصف الثاني المتوسط لمادة العلوم و تفـكيرهم البصري. تكونت عينة البحث من (58) طالباً، يتوزعون بين مجموعتين احدهما تجريبية و اخرى ضابطة. تم اعداد اداتين مقننتين احداهما لقياس التحصيل والاخرى لقياس التفــكير البصري، وبعد تطبيق تجربة البحث والحصول على البيانات، التي تمت معالجتها احصائيا باستخدام البرنامج الاحصائي(SPSS)؛ كشفت النتائج عن تفوق

... Show More
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Assessment of Azotobacter chroococcum’s Ability to Produce Hydrolytic Enzymes and Enhance Growth of Vicia faba
...Show More Authors

A. chroococcum isolate was examined for its ability to produce the hydrolytic enzymes chitinase, pectinase, protease, and lipase, in an effort to enhance the growth of fava bean (Vicia faba). Biological experiment was conducted in pots with complete random design (CRD). The experiment includes three treatments: control (plant without treatment) (P), NPK fertilizer (plant + fertilizer) (PF), and A. chroococcum inoculum (plant + A. chroococcum) (PA). These treatments were performed with sterile and non-sterile soil, which were planted with fava beans. At the end of experiment (seven weeks from planting), length and weight of plant shoot and plant root were calculated. The results show that the isolate wa

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Nov 02 2022
Journal Name
الترجمة والسانيات
دور المترجم في فهم النص الاصلي ودقة ترجمته لنصوص التوراة والانجيل الى لغة المستَقبِل
...Show More Authors

الملاخص

Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 03 2017
Journal Name
Journal Of Physical Education
تأثير تمرينات علاجية في تحسين مرونة الجذع وانعكاسها على آلام اسفل الظهر لذوي الاعاقة البدنية
...Show More Authors