The present study aims to identify wisdom-based thinking and its relationship to psychological capital. It further aims to find out the differences in the level of wisdom-based thinking and psychological capital according to the variables of gender and specialization (scientific, humanities). To achieve this, the study has been conducted on a sample of (380) male and female students. The two scales, wisdom-based thinking and psychological capital are implemented to the sample after being constructed by the researcher and after ensuring their psychometric characteristics' suitability for the study's aims. Results concerning the first aim have shown that there is a significant relationship among students. The second aim has revealed that there is no statistically significant difference according to the gender variable in wisdom-based thinking. According to the variable of specialization in wisdom-based thinking, there are statistically significant differences. Besides, there is no statistically significant difference between the variables of gender and specialization in wisdom-based thinking. According to the third aim, the results have proven a significant relationship among students, whereas the fourth aim does not have any statistically significant differences according to the gender variable. There are statistically significant differences in favor of students of humanities specialization. It has further found that there are statistically significant differences between the gender and specialization variables. Further, in the fifth aim, results have shown that there is a significant correlated relationship between the two variables. Accordingly, the study has set forward a number of recommendations and suggestions.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreIn these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis study deals with segmenting the industrial market as an independent variable and targeting the industrial market as a dependent variable. Since the industrial sector represents one of the most important fundamental pillars to build the economies of countries and their development , the Iraqi industrial sector was chosen as a population for the study . Based on measuring the study variables , identifying them and testing the correlation and effect on each other , the study reached a group of findings:
1- Increasing the level of availability of study variables inside the companies “The study sample”.
2- There is a correlation between the independent v
... Show MoreThe research aims to determine the impact of employees’ retention strategy on organizational memory. This research is historical, descriptive, and analytical. The sample consists of 158 faculty members in five private colleges in Baghdad. The technique used to analyze the data is SEM (Structural Equation Modeling), and SPSS (Statistical Package for the Social Sciences). The research concludes that the employees retaining strategy plays a vital role in retaining employees and hence maintains organizational memory. The findings and recommendations of this research assure the administrations of private colleges that employees retention strategy play a vital role in retaining its employee and hence maintains organizational memory. T
... Show MoreThe research aims to develop a proposed mechanism for financial reporting on sustainable investment that takes the specificity of these investments.
To achieve this goal, the researcher used (what if scenario) where the future financial statements were prepared for the year 2026, after completion of the sustainable project and operation, as the project requires four years to be completed.
The researcher relied on the results of the researchers collected from various modern sources relevant to the research topic and published on the internet, and the financial data and information obtained to assess the reality of the company's activity and its environmental, social, and economic i
... Show MoreChitinase-3-like 1 protein (YKL-40) is a glycoprotein primarily produced in the arthritic joint and plays a crucial role in inflammatory processes. The aim of the study is to establish the role of YKL-40 as a biomarker for rheumatoid arthritis (RA) compared to proinflammatory biomarkers and disease activity. The study included 58 patients and 18 control. Diseases activity score (DAS-28) and clinical disease activity index (CDAI) were measured. Serum level of YKL-40, tumor necrosis factor-α (TNF-α), interleukin-1B (IL-1β), erythrocyte sedimentation (ESR), rheumatoid factor (RF), C-reactive protein (CRP), and anti-citrullinated protein antibody (ACPA) were assessed. The results showed that the median serum YKL-40 level which was 5.42
... Show More