Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educational system, indeed, is closely connected with the culture of society. The study also gives an in-depth look at some concepts, mainly education, security, educational security, and sources of threat such as novelties, alternative religions, ethical system destruction, and curriculum distortion. It also attempts to provide a cursory account of the different effects of educational threat and presents some suggestions.
Two unsupervised classifiers for optimum multithreshold are presented; fast Otsu and k-means. The unparametric methods produce an efficient procedure to separate the regions (classes) by select optimum levels, either on the gray levels of image histogram (as Otsu classifier), or on the gray levels of image intensities(as k-mean classifier), which are represent threshold values of the classes. In order to compare between the experimental results of these classifiers, the computation time is recorded and the needed iterations for k-means classifier to converge with optimum classes centers. The variation in the recorded computation time for k-means classifier is discussed.
Targeted current research study of the relationship between guilt and self-consciousness and consisted of the research community of students from the open educational college, as has been selected students in the Department of Counseling and psychological science department and the researcher used guilt, prepared Scale (Ansari, 2003), and the measure of selfawareness prepared (Shammari 0.2000), and extracted his Alsekoumtria characteristics, Fastkhrjt alternatives after a presentation to a group of experts and specialists in the field of psychological counseling psychology, education, science and psychological validity and reliability Alvakronbach manner and retesting reaching reliability coefficient of guilt ((0.85) and awarenes
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
This research aims to establish a morphological study of the sources wrote picnic party in Morphology The sources from which he took the owners wrote their material (Nzhah Altarf) morphological accurate survey requires full briefing survey.
This is very difficult, because they were not mean with reference to the sources, who transferred them, so it was difficult to know the author, who mentioned it to say that on one hand, and on the other hand, find them do not deny preferred their predecessors of Arab scholars, and this is evidence of scientific integrity they have and high character they have, Sometimes we find that thay me htioh their opihios with their hames cite their views with anonymity, and sometimes their books and remember
This research deals with a problem of a large degree of importance. As globalization
has caused the emergence of global market for education. And it began the spread of
information technology leaves its impact on the attainment within the school in more than
field.
Therefore, it is necessary to find effective educational leadership could keep up with
developments in the field of education. Therefore this research interested in recognition the
foundations of effective educational leadership in terms of functions, and the preparation of
educational leaders. Accordingly, research has included three chapters, the first chapter
discusses the general frame work of the study contains the problem of the research, its
i
Today, problems of spatial data integration have been further complicated by the rapid development in communication technologies and the increasing amount of available data sources on the World Wide Web. Thus, web-based geospatial data sources can be managed by different communities and the data themselves can vary in respect to quality, coverage, and purpose. Integrating such multiple geospatial datasets remains a challenge for geospatial data consumers. This paper concentrates on the integration of geometric and classification schemes for official data, such as Ordnance Survey (OS) national mapping data, with volunteered geographic information (VGI) data, such as the data derived from the OpenStreetMap (OSM) project. Useful descriptions o
... Show MoreThe current research aims to identify the Vocational Self of the educational counselors as well as to identify the significant difference in the professional self according to the gender variable (male-female). The researcher adopted the scale of al-hasani (2015), which consisted of (34) items. It was applied to a sample of (300) school counselors (male-female) who were randomly selected from the six directorates in the Baghdad governorate for the academic year 2020/2021. The results showed that the research sample of educational counselors has a vocational self-concept. There are no statistically significant differences in the vocational self-concept between males and females among the educational counselors.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show More