Preferred Language
Articles
/
abaa-163
Trends of University Professors towards the Role of Social Networking Websites in Shaping Public Opinion about the Security Crises
...Show More Authors

Social networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the questionnaire form to identify the Iraqi academic elite's attitudes towards the role of social network sites in the formation of electronic public opinion towards security crises that Iraqi society has witnessed. By distributing the questionnaire to 112 of academic lecturer of various specializations and scientific titles, the researcher has come up with a number of results:
1-lecturers at Iraqi universities use Facebook in a percentage of 92%
2-Most of the Iraqi academic elite user social networking sites for three hours every day
3-The statement “expressing public opinion towards various security events and crises” has taken the first place in a percentage of 90% ranking as the most important communicative advantages achieved when using the social networking sites.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 20 2023
Journal Name
Arab Science Heritage Journal
السقيان الدلاليان الادراكي و التعبيري في اسماء البضائع دراسةلسانية وصفية
...Show More Authors

The research studies the semantic generation structures of
commodity names in the Baghdad dialect of Arabic, specifically
those names that reflect popular taste. Through descriptive field
studies of the social use of these words

View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
أثر انموذج دانيال في الدافعية المعرفية لطلاب الصف الثالث المتوسط
...Show More Authors

The Current research aims to identify ( The effects of Daniel Model in Cognitive Motivation for the Students of the Third grade average ) , To verify the objective of this research , the researchers added nul hypothesis following : There is no difference is statistically significant at the level of ( 0.05 ) between the average scores of students who studied Daniel Model and the average students who studied by using traditional method in Cognitive Motivation scale. The research was conducted on a sample of the average Third grade students in a medium Al – sadiq Al – Ameen secretary for boys affiliated to the General Directorate for Educational in Baghdad Al – rusafa 2 and for academic year ( 2014 – 2015 ) , the researchers adopted

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 26 2018
Journal Name
Journal Of Planner And Development
التوقيع المكاني لممدينة الرياضية في البصرة وتأثيره على التنمية الاقليمية
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
السياسة النقدية في العراق بعد 9/4/2003 (الواقع والطموح)
...Show More Authors

لا يستطيع كل كائن حي أو كيان اجتماعي أداء دوره الذي يفترض أن يقوم به ما لم يمتلك الوسائل الكافية والضرورية لأداء ذلك الدور قال سبحانه وتعالى ((قال ربنا الذي أعطى كل شيء خلقه ثم هدى طه 50)).

والنشاط الاقتصادي كجزء من الكيان الكلي للمجتمع لا يختلف عن هذه القاعدة، إذ عندما يراد من النظام الاقتصادي أداء دور فاعل فلا غنى له عن الوسائل التي تمكنه من أداء دوره المنشود. للنظام الاقتصادي مجمو

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Emergency Fuel Rationing system using RFID Smart Cards
...Show More Authors

Rationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lagrange Interpolation for Mobile Agent Connection Encryption
...Show More Authors

A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.

 

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Oct 15 2020
Journal Name
International Journal Of Energy Research
Mixed-ligand complexes of ampicillin derived Schiffbase ligand and Nicotinamide: Synthesis, physico-chemical studies, DFT calculation, antibacterial study and molecular docking analysis
...Show More Authors

A novel series of mixed-ligand complexes of the type, [ML 1 (L 2 ) 3 ]Cl x [M = Cr(III), Fe(III), Co(II),Ni(II), Cu(II), Cd(II) and Hg(II), n = 2, 3], was synthesized using Schiffbase (HL 1 ) as main ligand, nicotinamide (L 2 ) as secondary ligand, and the corresponding metal ions in 1:3:1 molar ratio. The main ligand, HL 1 was prepared by the interaction of ampicillin drug and 4-chlorobenzophenone. The synthesized mixed ligand complexes were characterized by elemental analysis, UV-Vis, FT-IR, 1 H-NMR, 13 C-NMR and TG/DTG studies. In the mixed-ligand complexes, the Schiffbase ligand, HL 1 showed coordination to the central metal ion in tridentate manner via azomethine nitrogen, β-lactam ring oxygen and deprotonated carboxylic oxy- gen atom

... Show More