Preferred Language
Articles
/
jcoeduw-1331
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educational system, indeed, is closely connected with the culture of society. The study also gives an in-depth look at some concepts, mainly education, security, educational security, and sources of threat such as novelties, alternative religions, ethical system destruction, and curriculum distortion. It also attempts to provide a cursory account of the different effects of educational threat and presents some suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
The Role of School in Promoting Intellectual Security of Students in Qurayyat Governorate
...Show More Authors

The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 21 2022
Journal Name
College Of Islamic Sciences
Sources of audio images in the poetry of the Islamic
...Show More Authors

      الحمدُ للهِ رب العالمين ، والصلاة والسلام على نبيه الأمين محمد r وعلى آله الطيبين الطاهرين ، وأصحابه الغر الميامين:

             تعد الصورة السمعية مفهوما بيانيا نجده في البلاغة العربية واضحاً مؤثرا، مؤديا دورا جوهريا في إيصال الفكرة التي يروم الأديب إيصالها إلى المتلقي   ولا تبدو السمعية واضحة إلاّ إذا نظر إليها في حالة أدبيه تهز كيان الشاعر &nbsp

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EDUCATIONAL SURVEY ABOUT AWARENESS OF TONSILLITIS IN BABYLON PROVINCE: EDUCATIONAL SURVEY ABOUT AWARENESS OF TONSILLITIS IN BABYLON PROVINCE
...Show More Authors

Tonsillitis is an infection or inflammation of the tonsils. Tonsillitis classified as acute, chronic (recurrent) and complication. Most often it is caused by a virus, but it may also be caused by the same bacteria that cause strep throat. According to numbers that data shows, the virus is more common, about 77.49% than bacterial which about 71.45% then fungal about 9.6%. The principal symptom of tonsillitis is a sore throat fever, swollen lymph nodes, nasal congestion, difficulty in swallowing and headache may also occur, according to if  symptoms of tonsillitis are known or not, data show that they know about (119 of people) (79.3) this result is greater than unknown which was about 31 (20.7).

View Publication Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
Educational Policies in Singapore and their Reflections on Development
...Show More Authors

Singapore has invested its human resources for the development of the country since earlier times, so it has directed attention to the education sector. Education and development complement each other, as investment in education has contributed over several years to the development of Singapore economy and has made it one of the strongest economies in Asia and the world. Despite the obstacles that faced educational policies in Singapore, the presence of a wise leadership capable of overcoming difficulties and solving them, and providing the appropriate atmosphere for the development of education has contributed significantly to making it one of the most advanced educational systems in the world, and making this system the main pillar for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
The Theory of Vital Space - Theoretical Study of Geopolitical Dimensions, Targets and Means (USA) Case Study
...Show More Authors

The concept of forming the living space in the American strategic thought has an
important position it is regarded as an strategic movement that it supports the American
United States with the huge capabilities in its own concern that enables it to approach of
American administration , we find that of different historical periods it works to establish that
the geopolitical dimension which is accompanied with the ability of American response for
the evens that in its own turn enables the American united states to seize the growing chances
in the global strategic environment This study includes five chapters :
- Chapter one: The idea of living space.
- Chapter two: Geopolitical dimension of living space theory.
-

... Show More
View Publication
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Studying the Classification of Texture Images by K-Means of Co-Occurrence Matrix and Confusion Matrix
...Show More Authors

In this research, a group of gray texture images of the Brodatz database was studied by building the features database of the images using the gray level co-occurrence matrix (GLCM), where the distance between the pixels was one unit and for four angles (0, 45, 90, 135). The k-means classifier was used to classify the images into a group of classes, starting from two to eight classes, and for all angles used in the co-occurrence matrix. The distribution of the images on the classes was compared by comparing every two methods (projection of one class onto another where the distribution of images was uneven, with one category being the dominant one. The classification results were studied for all cases using the confusion matrix between every

... Show More
Preview PDF
Crossref (5)
Crossref