Preferred Language
Articles
/
oxehLZIBVTCNdQwCPac2
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Statistical Evalution of Safety Procedures and Chemical Security in Chemical Laboratories / College Ibn Al Haitham
...Show More Authors
Abstract<p>In order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. T</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
مجلة الباحث
"The Pinkerton Agency" and its security activities in the United States of America 1850-1899
...Show More Authors

Fast economical developments in the US. in second half of nineteenth century contained many social results, such as increasing of stealing and killing crimes and expand of Labor strikes, which resulted in violence actions, and presented acceptable reason for emergence specialist security agencies, first of them "Pinkerton Agency". which played important role in all of that, besides that .. its role in American Civil War such as discovering an attempt to kill elected republican president Abraham Lincoln. This research studied all that aspects, focused on period of 1850 - 1899 of agency's history.

View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Evaluation the Safety and Security Procedures used In X-ray Clinics in Al-Harthiya-Baghdad
...Show More Authors
Abstract<p>Radiation is a form of energy, its emitted either in the form of particles such as α-particles and β-particles (beta particles including the electron and the positron) or waves such as sunlight, X-rays and γ-rays. Radiation found everywhere around us and it comes from many different sources naturally or man-made sources. In this study a questionnaire was distributed to people working in the field of X-rays that used for a medical imaging (X-ray and CT-scan) to evaluate the extent of awareness and knowledge in estimate the damage of ionizing radiation as a result of wrong use. The questionnaire was distributed to medical clinics in Al-Harithiya in Baghdad, which it’s considered as</p> ... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimating and Analyzing Food Security Indicators in Selected Arab Countries for the Period (1996 - 2012)
...Show More Authors

        The study hypothesize that the majority of Arab countries  show a poor agricultural economic efficiency which resulted in a weak productive capacity of wheat in the face of the demand, which in turn led to the fluctuation of the rate of self-sufficiency and thus increase the size of the food gap. The study aims at estimating and analyzing the food security indicators for their importance in shaping the Arabic agricultural policy, which aims to achieve food security through domestic production and reduce the import of food to less possible extent. Some of the most important results reached by the study were that the increase in the amount of consumption of wheat in the countries of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 02 2024
Journal Name
مجلة القادسية لللقانون والعلوم السياسية
Strategies of Israeli National Security towards Syrian Border Cities after 2011 (Quneitra, Swayda, and Daraa)
...Show More Authors

Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. M

... Show More
View Publication
Publication Date
Fri Nov 18 2022
Journal Name
International Journal Of Nanoscience
Plasma Production and Applications: A Review
...Show More Authors

Large amounts of plasma, the universe’s fourth most common kind of stuff, may be found across our galaxy and other galaxies. There are four types of matter in the cosmos, and plasma is the most common. By heating the compressed air or inert gases to create negatively and positively charged particles known as ions, electrically neutral particles in their natural state are formed. Many scientists are currently focusing their efforts on the development of artificial plasma and the possible advantages it may have for humankind in the near future. In the literature, there is a scarcity of information regarding plasma applications. It’s the goal of this page to describe particular methods for creating and using plasma, which may be us

... Show More
View Publication
Scopus (21)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
Data Analytics and Blockchain: A Review
...Show More Authors

Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Abuse elder and relationship life review
...Show More Authors

The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a

... Show More
View Publication Preview PDF
Publication Date
Mon May 27 2019
Journal Name
Al-academy
The Deliberative Action in the Labor Market of Iraqi Art The Concepts and the Application: شيماء وهيب خضير
...Show More Authors

The analysis of the orientations of Iraqi art commodification contributed to the discovery of deliberation, which was founded in the deliberative discourse in the trends towards commodification in the Iraqi art, since the important transformations in social structures and relations produced a dictionary with new vocabulary and tools that replaced the traditions and norms that have been in circulation for a century. Deliberation and commodification have become more prevalent in the mechanics and trends of the art where the pace of change is becoming increasingly frantic towards the market. The general market for art constitutes one of the most effective phenomena within contemporary art, that there has been a proliferation of sales auctio

... Show More
View Publication Preview PDF
Crossref (1)
Crossref