Social networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the questionnaire form to identify the Iraqi academic elite's attitudes towards the role of social network sites in the formation of electronic public opinion towards security crises that Iraqi society has witnessed. By distributing the questionnaire to 112 of academic lecturer of various specializations and scientific titles, the researcher has come up with a number of results:
1-lecturers at Iraqi universities use Facebook in a percentage of 92%
2-Most of the Iraqi academic elite user social networking sites for three hours every day
3-The statement “expressing public opinion towards various security events and crises” has taken the first place in a percentage of 90% ranking as the most important communicative advantages achieved when using the social networking sites.
four coordinated complexes for divalent metal ions : Mn, Fe, Co, Ni, Cu and Cd have been synthesized using bidentate Schiff base ligand type (NN)formed by the condensation of o-phenylenediamine , p- methylbenzadehyde and furfural in methanol. The ligand was reacted with divalent metal chloride forming complexes of the types :[M(L)Cl2] where : MII=Mn, Fe, Ni, Cu, and Cd . These new compounds were characterized by elemental analysis, spectroscopic methods (FT-IR, U.V-Vis, 1HNMR (for ligand only and atomic absorption) , magnetic susceptibility, chloride content along with conductivity measurement. These studies revealed that the geometry for all complexes about central metal ion is tetrahedral.
SYNTHESIS AND CHARACTERISATION OF NEWCo(II), Zn(II) AND Cd(II) COMPLEXES DERIVED FROM OXADIAZOLE LIGAND AND 1,10-PHENANTHROLINE AS Co-LIGAND
Core decompression is one of the commonest used techniques in the handling of osteonecrosis of the pre-collapsed head of the femur. Core decompression had succeeded in preserving the hip joint and delaying the requisite for total hip replacement, but it had failed in the induction of osteogenesis in the necrotic area, thus augmenting core decompression with biological agents to induce osteogenic activity. To assess the effects of platelet-rich plasma in non-traumatic avascular necrosis of the hip joint (early stage) after core decompression. Interventional comparative study for twenty-four patients (32 hip joints) with AVN of the head of the femur was involved in this prospective study, and they were separated into two groups of 16
... Show MoreAim: To evaluate the cytotoxic activity of newly synthesized a series of novel HDAC inhibitors comprising sulfonamide as zinc binding group and Isatin derivatives as cap group joined by mono amide linker as required to act as HDAC inhibitors. Materials and Methods: The utilization of sulfonamide as zinc binding group joined by N-alkylation reaction with ethyl-bromo hexanoate as linker group that joined by amide reaction with Isatin derivatives as cap groups which known to possess antitumor activity in the designed of new histone deacetylase inhibitors and using the docking and MTT assay to evaluate the compounds. Results: Four compounds have been synthesized and characterized successfully by ART-FTIR, NMR and ESI-Ms. the compounds w
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAbstract The current research aims to identify the most prominent beliefs about coronavirus of Baghdad University students, as well as to identify the prominent beliefs toward coronavirus of male and female students. To achieve the research objectives, a questionnaire of (15) items was administered to a sample of (600) male and female students collected from ten different colleges at the university of Baghdad. The findings of the research illustrated that item (8) took priority as students believe there is a misleading about coronavirus spreading by governments, item (2) which indicated that coronavirus is man-made took level two, followed by item (10), it proposes that coronavirus emerged from the American military base in china. Additiona
... Show More