Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educational system, indeed, is closely connected with the culture of society. The study also gives an in-depth look at some concepts, mainly education, security, educational security, and sources of threat such as novelties, alternative religions, ethical system destruction, and curriculum distortion. It also attempts to provide a cursory account of the different effects of educational threat and presents some suggestions.
Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreWireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving ener
... Show MoreWater is a resource and a crucial aspect of living and surviving. In Iraq, the Tigris River is one of the most critical water sources. The present study aimed to provide an insight analysis of some water quality parameters including the microbial content of drinkable tap water and river water. Ten Water samples (T1- T10) in triplicate were collected from sampling sites -Site I (Tap water) from home water taps, supplied by the Water Filtration Station/ Al Karama Project/ Al-Karkh> 10 from Site II (R1- R10)River water from Tigris River (around or near the Water Filtration Station/ Al Karama Project) every week (from September to half of November 2022), then were immediately placed in sterile bottles and transported to Microbiolo
... Show MoreAll domains in this world built based on set of theories. Those theories have been responsible for interpretation of some phenomena and interlocking relationships around us. Commonly, theories are categorized by which aspect is believed. Also,can find a group of theories produced regardingto the leadership domain. This paper will be presented some of these theories like (Great Man Theory, Trait Theory, Behavioral Theories, Contingency Theories, Situational Theory, Transactional Theories, and Transformational Theories). where these theories considered the most popular and common in the field of leader and will be discussed by this work
There are Islamic sources and books that deal with the different doctrinal and differential framework of the Islamic religion with a monistic approach, describing them with embarrassing jurisprudential titles such as: excommunication and expiation, and epithets that carry the characteristics of hatred and rejection, in addition to removing them from the sect and religion, and the reason for that is that the doctrine (A) or (b) considers itself the doctrine that represents only the Islamic religion, and other doctrines are misguided and disbelieving. the reasons behind this - besides the attempt to establish doctrinal and fiqih rooting in claiming truth and escaping from within the foundational differential doctrinal system – is the pol
... Show MoreABSTRACT The isolation and characterization of (27) isolate of extreme halophilic bacteria was performed ninteen isolate belonged to the genus Halobacterium which included Hb.halobium. Hb. salinarium, Hb. volcanii. Growth curve and generation time in logarthmic phase was measured and found to be (12.8hr±0.32), (11.2hr±0.2), (9.8hr±0.87), respectivaly. Effect of various concentrations of NaCl, KCI, NH4Cl and MgSO4.7H2O was studied, NaCl was essential for the rod shape rapid growth Rat and pigmentation. Less than 1% concentration caused lysis of bacteria. Yeast extract was the best carbone source as compared with glucose and casamino acid.
The political system in Indonesia, since gaining independence from the Dutch colonialism on the seventeenth of August 1945, has gone through long stages. The Indonesian constitution stipulated that the country is based on a democracy. In 1956 the first free elections were held in Indonesia, and President Sukarno announced the adoption of the directed democratic system Then, during the era of President Suharto, the state entered a phase called democracy based on the Five Pancasila principles, which is a false democracy because it served the interests of Suharto, who in his long reign had political and economic corruption leading up to 1998, when the Indonesian people revolted, and the government of Soeharto was overthrown
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More
This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.
It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<
... Show MoreDisasters, crises and wars are a serious and unforeseen threat. The capacity of the early warning system to monitor such crises is therefore crucial. The ability to make quick decisions in a short time is necessary to prevent crises from occurring. Here, the role and effectiveness of the early warning system emerges through its ability to monitor, record and analyze signals. It can also be evidenced by its ability to immediately convey these indicators to the concerned authorities to take measures that ensure these conflicts and disasters do not worsen. The system’s ability to detect disasters and crises, identify the crisis and its type, and use the scientific method and common sense to deal with it is something that contributes to findi
... Show More