Preferred Language
Articles
/
jperc-219
Measuring university teachers attitudes towards the security man
...Show More Authors

Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The researchers extracted the psychometric properties of the measure, including the virtual validity and reliability testing and re-testing in a way, andIt was then calculate the correlation coefficient between the scores of individuals in the first and second application using the correlation coefficient (Person) and the degree was (0.84) correlationcoefficient.The researchers used several statistical methods to process information, including the percentage equation Fisher and center-weighted and Pearson correlation coefficient and (t - test) for one sample, and (t - test) for two independent samples pouch Statistical Social Sciences (SPSS). The results showed that there are positive trends by university teachers around the security man in general. As for the differences between the sexes results showed that there were significant differences between the sexes (male and female) and the results were in favor of males. In light of the findings the researchers made a number of recommendations and proposals.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Wed Oct 01 2008
Journal Name
Journal Of Educational And Psychological Researches
سلوك التملق لدى طالبات الجامعة كما يدركه تدريسيو الجامعة
...Show More Authors

اهمية البحث والحاجة اليه:

تعد الازمات التي تمر بها المجتمعات لفترات زمنية طويلة عاملاً مساعداً على تشكيل انسان تكون قيمه ومعتقداته وسلوكياته تختلف عما هو سائد في المجتمع ويعود سبب ذلك الى استمرار تعرض المجتمع لمزيد من الضغوط مما يجعل التنظيم الاجتماعي والنفسي يمر بحالة من الاضطراب (حسن، 1997، ص2) ، تظهر بصورة سلوك تملقي يمارسه الفرد للحصول على ما يريد وهذا ما بينه ابن خلدون في مقدمته ان من بين

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Practicing Citizenship Values by Bisha University Students
...Show More Authors

 

Abstract

 

The study aims to identify the degree of citizenship values practiced by Bisha University students and identify the impact of gender, college, and academic level, on the degree of the practice of University students for citizenship values. The researcher used the descriptive-analytical method including a questionnaire of (44) items. To process the data, the researcher applied the computational averages, standard deviations, percentages, and T-test. The questionnaire was implemented on a sample of (600) of the 2 and 8 levels during the second semester of the academic year (2020-2019) at Bisha University. The study findings revealed that the degree of the pra

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Evaluation the Safety and Security Procedures used In X-ray Clinics in Al-Harthiya-Baghdad
...Show More Authors
Abstract<p>Radiation is a form of energy, its emitted either in the form of particles such as α-particles and β-particles (beta particles including the electron and the positron) or waves such as sunlight, X-rays and γ-rays. Radiation found everywhere around us and it comes from many different sources naturally or man-made sources. In this study a questionnaire was distributed to people working in the field of X-rays that used for a medical imaging (X-ray and CT-scan) to evaluate the extent of awareness and knowledge in estimate the damage of ionizing radiation as a result of wrong use. The questionnaire was distributed to medical clinics in Al-Harithiya in Baghdad, which it’s considered as</p> ... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 31 2023
Journal Name
Journal Of Language Studies
Investigating Motivational Teaching Strategies used by Iraqi EFL Primary School Teachers
...Show More Authors

Motivation is one of the most important factors that influence students learning and has a great effect on their success and achievement. For this reason, in this paper, the researcher is going to investigate the motivational teaching strategies used by EFL Iraqi school teachers. To achieve the aim of the study, the researcher adapted a questionnaire with some changes and modification’s. This questionnaire with five point scale (always, often, sometimes, rarely and never). To achieve face validity, the questionnaire items are given to a jury of experts. Alpha Cronbach formula is used to achieve the questionnaire reliability. After that, the questionnaire was applied on a sample of 38 teachers during the academic year 2019-2020. Th

... Show More
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
The Reality of Adapting Curricula and Educational Programs for Pupils with Visual Handicapped from Their Teachers’ Perspectives
...Show More Authors

The current study aims to identify the level of adaptation of the curriculum for visually handicapped pupils from the point of view of their teachers as well as to identify the level of adaptation of the educational programs offered to visually handicapped pupils from the point of view of their teachers. In order to achieve the goals of the research, the researcher developed two tools to measure the adaptation of curricula and educational programs for pupils with visual handicapped from the point of view of teachers. The sample included (60) teachers from Al Noor Institute for Blinders in Baghdad, the two tools were applied to them, and then the Reliability and Validity coefficients were extracted. The results sh

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
Tendencies of Scientific Research in the Specialized Journalism: the Media Researcher Magazine A sur-vey study
...Show More Authors

The study of the tendencies of scientific research in specialized journalism through the three specialized levels, specifically the third level. It is referred to be a monthly, quarterly or annual magazine that follows the publication of the researches for new studies which have come to in every specialization. it is directed to the highly educated and is almost an alternative book. Thus, the subject is specialized and the audience is specialized.

The study aims in both its survey and field section at knowing the type of researches and their classification and the form, gender and the use of foreign sources and their scientific tank and the geographical position in addition to knowing the opinions of researchers and their satisfa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 22 2018
Journal Name
Arab Science Heritage Journal
نحو نحو نظام لغوي عربي متوازن في المساواة بين الرجل والمرأة
...Show More Authors

     Human Rights The word of graduation in the Arabic language to many meanings may be the most appropriate of what Al-Ragheb Al-Isfahani said in the right: is the coming of the thing from saying or doing at the time it must and in the form that must be, so the term human rights includes the following:First: A party has the right and another duty to.

View Publication Preview PDF
Publication Date
Sun Oct 31 2021
Journal Name
International Journal Of Sustainable Development And Planning
The Crossing as a New Approach for the Urban Transformation of Traditional Cities Towards the Sustainability
...Show More Authors

The topic of urban transformations has attracted the attention of researchers as it is one of the basic issues through which cities can be transformed towards sustainability. A specific level of transformation levels according to a philosophical concept known as a crossing. This article has relied on a specific methodology that aims to find a new approach for urban transformation based on the crossing concept. This concept derives from philosophical entrances based on the concepts of (being, process, becoming, and integration). Four levels have been for the crossing are (normal, ascending, leap, and descending). Each of these levels includes specific characteristics that distinguish it. The results showed that there is no descending

... Show More
View Publication
Scopus (17)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 30 2026
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Adaptive Security Model for Data Protection Using Behavioral User Authentication
...Show More Authors

Credential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi

... Show More
View Publication
Crossref