Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educational system, indeed, is closely connected with the culture of society. The study also gives an in-depth look at some concepts, mainly education, security, educational security, and sources of threat such as novelties, alternative religions, ethical system destruction, and curriculum distortion. It also attempts to provide a cursory account of the different effects of educational threat and presents some suggestions.
Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe concept of forming the living space in the American strategic thought has an
important position it is regarded as an strategic movement that it supports the American
United States with the huge capabilities in its own concern that enables it to approach of
American administration , we find that of different historical periods it works to establish that
the geopolitical dimension which is accompanied with the ability of American response for
the evens that in its own turn enables the American united states to seize the growing chances
in the global strategic environment This study includes five chapters :
- Chapter one: The idea of living space.
- Chapter two: Geopolitical dimension of living space theory.
-
In this research, a group of gray texture images of the Brodatz database was studied by building the features database of the images using the gray level co-occurrence matrix (GLCM), where the distance between the pixels was one unit and for four angles (0, 45, 90, 135). The k-means classifier was used to classify the images into a group of classes, starting from two to eight classes, and for all angles used in the co-occurrence matrix. The distribution of the images on the classes was compared by comparing every two methods (projection of one class onto another where the distribution of images was uneven, with one category being the dominant one. The classification results were studied for all cases using the confusion matrix between every
... Show MoreMillions of lives might be saved if stained tissues could be detected quickly. Image classification algorithms may be used to detect the shape of cancerous cells, which is crucial in determining the severity of the disease. With the rapid advancement of digital technology, digital images now play a critical role in the current day, with rapid applications in the medical and visualization fields. Tissue segmentation in whole-slide photographs is a crucial task in digital pathology, as it is necessary for fast and accurate computer-aided diagnoses. When a tissue picture is stained with eosin and hematoxylin, precise tissue segmentation is especially important for a successful diagnosis. This kind of staining aids pathologists in disti
... Show MoreNews are considered the most press arts that supply the target audiences with daily information and events happened inside and outside society since it is formed by depending on its resources which have a deep relation with formal corporations to gain their satisfaction in order to support their authority and spreading their domination by using mass media in editing their viewpoints and achieving wide acceptance among public opinion. In the field of technological development and changing in the fields of politics, society, culture, economics etc. inside Iraqi society and democratic transition help to convert news agenda from independent variation to a fellow variation while in the past the variation of mass media was the independent one
... Show MoreThe inhibitory action of four lactobacilli isolates Lactobacillus bulgaricus, L. acidophilus, L. plantarum and L. fermentum, isolated from four different samples; yoghurt, vinegar, saliva and vagina respectively, on Escherichia coli and Staphylococcus aureus adhesion to uroepithelial cells were investigated. Results showed that all Lactobacillus isolates or their supernatant were able to reduce the number of the uropathogens attached to uroepithelial cells. However, inhibition level of lactobacilli cells was higher than their supernatant. Nevertheless, the human indigenous lactobacilli (L. fermentum and L. plantarum) were more competitive than food lactobacilli (L. acidophilus and L. bulgaricus).
Anthropogenic activities cause soil pollution with different serious pollutants, such as polycyclic aromatic hydrocarbon (PAHs) compounds. This study assessed the contamination of PAHs in soil samples collected from 30 sites divided into eight groups (residential areas, oil areas, agricultural areas, roads, petrol stations, power plants, public parks and electrical generators) in Basrah city-Iraq during 2019-2020. The soil characteristics including (moisture, pH, EC and TOC) were measured. Results showed the following ranges (soil moisture (0.03-0.18%),pH (6.90-8.16), EC (2.48-104.80) mS/cm and TOC (9.90-20.50%)). Gas Chromatography (GC) was used to measure PAHs in extracted soil samples. The total PAH range (499.96 - 5864.86) ng/g dr
... Show More