Preferred Language
Articles
/
jcoeduw-1331
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educational system, indeed, is closely connected with the culture of society. The study also gives an in-depth look at some concepts, mainly education, security, educational security, and sources of threat such as novelties, alternative religions, ethical system destruction, and curriculum distortion. It also attempts to provide a cursory account of the different effects of educational threat and presents some suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
User (K-Means) for clustering in Data Mining with application
...Show More Authors

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 21 2023
Journal Name
مجلة كلية الحقوق ـ جامعة النهرين
مسؤولية منتسبي قوى الامن الداخلي عن اعمالهم الشخصية
...Show More Authors

يتناول البحث مسؤولية منتسبي قوى الامن الداخلي عن اعمالهم الشخصية

Publication Date
Wed Oct 01 2008
Journal Name
Journal Of Educational And Psychological Researches
قياس الامن النفسي لدى طالبات كلية التربية للبنات
...Show More Authors

مشكلة البحث واهميته

يعد الامن النفسي من الحاجات الاساسية اللازمة للنمو النفسي السليم لكل فرد، واذا ما اشبعها الانسان تهيأ لاشباع حاجاته النفسية والاجتماعية الاخرى. وتشتمل هذه الحاجة على تجنب الالم والتحرر من الخوف اياً كان مصدره والشعور بالطمأنينة الاقتصادية والاجتماعية والجسمية والحصول على تقبل الاخرين ورضاهم، فضلاً عن تقبل الفرد لنفسه وقناعته ورضاه عنها.

ان الشعور ب

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 02 2008
Journal Name
Political Sciences Journal
الامن الجماعي في اسيا ... بقلم : لونيك فرو وار
...Show More Authors

الامن الجماعي في اسيا .. بقلم : لونيك فرو وار

View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Biotechnology Research Center
Molecular screening of the entA gene of Enterococcus faecium isolated from Food and clinical sources
...Show More Authors

Background: The microbial production of substances that have the potency to suppress the growth of other microorganisms is probably one of the prevalent defense strategy developed in nature, microorganisms produce a variable bunch of microbial defense systems, which include antibiotics, metabolic by-products, lytic agents, bacteriocins and others. Objective: The purpose of the present study was to isolate and identify Enterococcus faecium isolates then detecting its ability of carrying the gene responsible for enterocin production in this species. Materials and methods: Out of 50 samples from different sources (food and clinical sources) were collected for the Enterococcus faecium isolation, and the isolated bacteria Enterococ

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
Calculation and study of internal radiation doses resulting from the ingestion of some radioactive sources
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Quranic and Sunnah Educational Principles of the Muslim Child
...Show More Authors

    

Child's personality development in Islam, in fact, represents the building of the Islamic community and a step on the way for the establishment of life, state, law, and civilization in accordance with the blessed Islamic principles, in order to achieve the happiness of the human being and to protect the components of society and preserve human safety. Child is the issue of interest across many years.  Paying heed to childhood issues is not a recent one. The faith of these communities in the child's rights and his education, which makes a man who cherishes himself and his language and homeland.

     The success of Islamic goals, the happiness of the individual and the

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Advanced Security Technique in Presence of Open Communication System and Cyber Era
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jan 05 2014
Journal Name
Journal Of Educational And Psychological Researches
The educational violence and it's reflections on study attainment of the primary stage pupils
...Show More Authors

Chapter-1

Problem of the research: 

The studies and researches have noticed the aggravation of violence practice in all educational means using different and innovated styles against children in the school and house in order to upbringing by the parents or the school .

It is a training method for the person to participate in the society and prepare him to be an effective member.

The current research confines the children in age (6-12) years old representing the primary stage who face different kind of violence during the familiar or school education.

The current research aims to:

1 – The kinds of violence which happens to the children in the primary

... Show More
View Publication Preview PDF