Preferred Language
Articles
/
jcoeduw-1331
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educational system, indeed, is closely connected with the culture of society. The study also gives an in-depth look at some concepts, mainly education, security, educational security, and sources of threat such as novelties, alternative religions, ethical system destruction, and curriculum distortion. It also attempts to provide a cursory account of the different effects of educational threat and presents some suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 10 2021
Journal Name
Neuroquantology
Atmospheric Emissions Effects and Mechanism
...Show More Authors

Humanity's relationship with the environment is a delicate balance. Since the industrial revolution, the world's population has grown at an exponential rate, and this has a major environmental effect. Deforestation, pollution, and global climate change are just a few of the negative consequences of population and technological growth. Particulates, Sulphur dioxide (SO2), and nitrogen oxides (NOx) are the primary pollutants that harm our health. These contaminants may be directly emitted into the atmosphere (primary pollutants) or formed in the atmosphere from primary pollutants reacting (secondary pollutants. Tropospheric ozone is created When water reacts with volatile organic compounds (VOC) and nitrogen oxides (NOx) in the presen

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Impact of different sources of noise exposure on hearing impairment: A cross- sectional study
...Show More Authors

Background: Mental health is integrated into PHC as a strategy of WHO to fill the gap in mental health treatment. Part of this strategy needs a level of task shifting so that mental health care is provided by different level of PHC workers and not only specialists such as psychiatrists and psychologists.

Objectives: To assess the knowledge and attitudes of family doctors regarding the provision of psychological health in PHCC and if there is an association between the certificates of these family doctors and their Knowledge and attitudes to psychological health.

Subjects and Methods:  A cross-sectional descriptive study with analytic elements was conducted in 8 famil

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Statistical Evalution of Safety Procedures and Chemical Security in Chemical Laboratories / College Ibn Al Haitham
...Show More Authors
Abstract<p>In order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. T</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
مجلة الباحث
"The Pinkerton Agency" and its security activities in the United States of America 1850-1899
...Show More Authors

Fast economical developments in the US. in second half of nineteenth century contained many social results, such as increasing of stealing and killing crimes and expand of Labor strikes, which resulted in violence actions, and presented acceptable reason for emergence specialist security agencies, first of them "Pinkerton Agency". which played important role in all of that, besides that .. its role in American Civil War such as discovering an attempt to kill elected republican president Abraham Lincoln. This research studied all that aspects, focused on period of 1850 - 1899 of agency's history.

View Publication
Publication Date
Sun Jun 02 2019
Journal Name
International Journal Of Multidisciplinary And Current Research
The security problem in the Gulf Cooperation Council countries Study on internal challenges and future prospects
...Show More Authors

The importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Ieee Access
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN
...Show More Authors

Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat

... Show More
View Publication
Scopus (16)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Work pressure of the administrative and academic members of Biskra University, its sources and its relation to some personal and functional variables
...Show More Authors

  The study aimed to highlight the reality of the functional pressures with its dimensions (role ambiguity, role conflict, role burden, glass ceiling, and discrimination in composition). The researchers also relied on the questionnaire as a essential tool for data collection. The field study was conducted at the University of Mohammed Khiedr - Biskra -, the study was conducted on the basis of the total survey, which included all the workers of the 6 faculties of Biskra University (523 female employees).

     After the analyzing of the data using the version 21 of the statistical program Spss, The study reached a number of results, the most of them is the low level of the functiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2024
Journal Name
Journal Of Kufa Legal And Political Science
The Legal Regime of Mandatory Mediation as a Means of Dispute Resolution – A Comparative Analytical Study
...Show More Authors

The mediation system is based on settling the dispute amicably through the intervention of a third party by bringing views closer away from the judiciary, which is an amicable way to settle disputes, which disputants resort to voluntarily, but some Western legislation has begun to impose resorting to mediation to settle disputes compulsorily, to take advantage of its advantages, get rid of the disadvantages of resorting to the judiciary in some disputes, and relieve pressure on the courts.

Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref