Social networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the questionnaire form to identify the Iraqi academic elite's attitudes towards the role of social network sites in the formation of electronic public opinion towards security crises that Iraqi society has witnessed. By distributing the questionnaire to 112 of academic lecturer of various specializations and scientific titles, the researcher has come up with a number of results:
1-lecturers at Iraqi universities use Facebook in a percentage of 92%
2-Most of the Iraqi academic elite user social networking sites for three hours every day
3-The statement “expressing public opinion towards various security events and crises” has taken the first place in a percentage of 90% ranking as the most important communicative advantages achieved when using the social networking sites.
The research studies the semantic generation structures of
commodity names in the Baghdad dialect of Arabic, specifically
those names that reflect popular taste. Through descriptive field
studies of the social use of these words
The Current research aims to identify ( The effects of Daniel Model in Cognitive Motivation for the Students of the Third grade average ) , To verify the objective of this research , the researchers added nul hypothesis following : There is no difference is statistically significant at the level of ( 0.05 ) between the average scores of students who studied Daniel Model and the average students who studied by using traditional method in Cognitive Motivation scale. The research was conducted on a sample of the average Third grade students in a medium Al – sadiq Al – Ameen secretary for boys affiliated to the General Directorate for Educational in Baghdad Al – rusafa 2 and for academic year ( 2014 – 2015 ) , the researchers adopted
... Show Moreلا يستطيع كل كائن حي أو كيان اجتماعي أداء دوره الذي يفترض أن يقوم به ما لم يمتلك الوسائل الكافية والضرورية لأداء ذلك الدور قال سبحانه وتعالى ((قال ربنا الذي أعطى كل شيء خلقه ثم هدى – طه 50)).
والنشاط الاقتصادي كجزء من الكيان الكلي للمجتمع لا يختلف عن هذه القاعدة، إذ عندما يراد من النظام الاقتصادي أداء دور فاعل فلا غنى له عن الوسائل التي تمكنه من أداء دوره المنشود. للنظام الاقتصادي مجمو
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreA new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreA novel series of mixed-ligand complexes of the type, [ML 1 (L 2 ) 3 ]Cl x [M = Cr(III), Fe(III), Co(II),Ni(II), Cu(II), Cd(II) and Hg(II), n = 2, 3], was synthesized using Schiffbase (HL 1 ) as main ligand, nicotinamide (L 2 ) as secondary ligand, and the corresponding metal ions in 1:3:1 molar ratio. The main ligand, HL 1 was prepared by the interaction of ampicillin drug and 4-chlorobenzophenone. The synthesized mixed ligand complexes were characterized by elemental analysis, UV-Vis, FT-IR, 1 H-NMR, 13 C-NMR and TG/DTG studies. In the mixed-ligand complexes, the Schiffbase ligand, HL 1 showed coordination to the central metal ion in tridentate manner via azomethine nitrogen, β-lactam ring oxygen and deprotonated carboxylic oxy- gen atom
... Show More