Preferred Language
Articles
/
jcoeduw-1331
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educational system, indeed, is closely connected with the culture of society. The study also gives an in-depth look at some concepts, mainly education, security, educational security, and sources of threat such as novelties, alternative religions, ethical system destruction, and curriculum distortion. It also attempts to provide a cursory account of the different effects of educational threat and presents some suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Educational values and their role in some religions
...Show More Authors

                           
 The Islamic religion approach Rabbani urges and seeks to bring happiness to people, as Allah says: ((We sent thee not all people glad tidings and a warner, but most people do not know)) Spa: State 28
   Islam looks at the concept of educational values ​​through positive behavior derived emerging through formal and informal education. The Islamic approach works on the basis of a systematic and clear rule in the form of an integrated system includes multiple areas. As the lead actor role as the desired position.
  Although 

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Educational goals of Quranic proverbs
...Show More Authors

The research sought to know the educational goals of Quranic proverbs, The first chapter: includes general terms of research, its problem, its importance, its objectives, its methodology, and the definition of terms. In the second chapter: Proverbs in Quranic usage such as simple and complex proverbs, standard proverbs, In the third chapter, the educational objectives of the Quranic proverbs include: bringing the meaning, persuasion, thought provoking ..... the educational characteristics of the Koranic verses, including: accuracy of photography, and the truth of similar, and included the lesson applied lesson, Chapter fourth : Conclusions and Recommendations with abstra

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Guilt and its relationship with the self-awareness Educational research Open Educational College Students
...Show More Authors

Targeted current research study of the relationship between guilt and self-consciousness and consisted of the research community of students from the open educational college, as has been selected students in the Department of Counseling and psychological science department and the researcher used guilt, prepared Scale (Ansari, 2003), and the measure of selfawareness prepared (Shammari 0.2000), and extracted his Alsekoumtria characteristics, Fastkhrjt alternatives after a presentation to a group of experts and specialists in the field of psychological counseling psychology, education, science and psychological validity and reliability Alvakronbach manner and retesting reaching reliability coefficient of guilt ((0.85) and awarenes

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 13 2024
Journal Name
قسم الدراسات اللغوية والترجمية في بيت الحكمة
مصادر التعابير العبرية في اللغات السامية
...Show More Authors

Publication Date
Fri Jul 01 2011
Journal Name
25th International Cartographic Conference
User generated content and formal data sources for integrating geospatial data
...Show More Authors

Today, problems of spatial data integration have been further complicated by the rapid development in communication technologies and the increasing amount of available data sources on the World Wide Web. Thus, web-based geospatial data sources can be managed by different communities and the data themselves can vary in respect to quality, coverage, and purpose. Integrating such multiple geospatial datasets remains a challenge for geospatial data consumers. This paper concentrates on the integration of geometric and classification schemes for official data, such as Ordnance Survey (OS) national mapping data, with volunteered geographic information (VGI) data, such as the data derived from the OpenStreetMap (OSM) project. Useful descriptions o

... Show More
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Educational Leadership
...Show More Authors

This research deals with a problem of a large degree of importance. As globalization
has caused the emergence of global market for education. And it began the spread of
information technology leaves its impact on the attainment within the school in more than
field.
Therefore, it is necessary to find effective educational leadership could keep up with
developments in the field of education. Therefore this research interested in recognition the
foundations of effective educational leadership in terms of functions, and the preparation of
educational leaders. Accordingly, research has included three chapters, the first chapter
discusses the general frame work of the study contains the problem of the research, its
i

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 02 2024
Journal Name
العلوم القانونية والسياسية
الحروب والصراعات وتداعيتها على الامن الانساني
...Show More Authors

تعد الحروب و الصراعات واحدة من اقدم الظواىر التي عرفتها المجتمعات البشرية وان ىذه الظاىرة تجسدت في البداية على مستوى الصراعات الفردية عندما كانت ترتقي الى مستوى الاشتباك وكانت بدائية في وسائلها وادواتها ،وكما ان ظاىرة الحرب بدأت من الاسرة ومن ثم القبيلة والعشيرة وانتهت بالدولة ،اذ ان ظاىرة الحروب بشكلها التقليدي تأخذ شكلا تدميريا بعد ان تتطور ابعادىا القصوى وان حدوثها ىو تضارب مصالح واىداف الاطراف وانها ال

... Show More
Preview PDF