Preferred Language
Articles
/
jcoeduw-1331
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educational system, indeed, is closely connected with the culture of society. The study also gives an in-depth look at some concepts, mainly education, security, educational security, and sources of threat such as novelties, alternative religions, ethical system destruction, and curriculum distortion. It also attempts to provide a cursory account of the different effects of educational threat and presents some suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Information Sources and their Role in E-learning from Iraqi College Students’ Viewpoint
...Show More Authors

The study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 05 2014
Journal Name
Journal Of Educational And Psychological Researches
The educational violence and it's reflections on study attainment of the primary stage pupils
...Show More Authors

Chapter-1

Problem of the research: 

The studies and researches have noticed the aggravation of violence practice in all educational means using different and innovated styles against children in the school and house in order to upbringing by the parents or the school .

It is a training method for the person to participate in the society and prepare him to be an effective member.

The current research confines the children in age (6-12) years old representing the primary stage who face different kind of violence during the familiar or school education.

The current research aims to:

1 – The kinds of violence which happens to the children in the primary

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Mar 01 2025
Journal Name
European Journal Of Ecology, Biology And Agriculture
Molecular Characterisation of Virulence Factors in Cryptococcus spp. Isolated from Humans, Pigeons, and Eucalyptus Sources
...Show More Authors

This study aimed to isolate and identify Cryptococcus species from three distinct sources: sputum samples of pigeon fanciers, dried pigeon droppings, and eucalyptus tree leaves. A total of 150 specimens were collected over a two-month period, comprising 50 samples each from human sputum, pigeon droppings collected across various areas of Baghdad, and eucalyptus leaves obtained from the Baghdad College of Veterinary Medicine. All samples were cultured on Sabouraud dextrose agar supplemented with chloramphenicol and incubated at 25°C for 2–3 days. From the initial cultures, 20 isolates presumptively identified as Cryptococcus spp. were obtained: 6 isolates (12%) from human sputum, 9 isolates (18%) from pigeon droppings, and 5 isol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Proceedings Of The 5th International Conference On Information Systems Security And Privacy
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
MR Brain Image Segmentation Using Spatial Fuzzy C- Means Clustering Algorithm
...Show More Authors

conventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation. 

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
COLLABORATIVE WRITING AS A MEANS IN DEVELOPING EFL LEARNERS’ WRITING PERFORMANCE
...Show More Authors

Collaborative learning is a way that prepares students practically for real-world applications. Working together as teamwork to execute various writing skills is essential in most professions since it increases the level of experience. Thus, the current study aims to identify the role collaborative writing in developing students' level of performance in writing. It is qualitative in nature since the researcher depended on the extant literature in achieving the objective of the study. The researcher touched upon related theories that addressed Collaborative learning, categories, and problems .It concluded that collaborative writing increases the students’ self-confidence, self-esteem, creativity, and motivation through the interact

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
International Journal Of Agricultural And Statistical Sciences
EFFECT OF CULTIVATION DATES AND DIFFERENT SOURCES OF SOIL FERTILIZATION ON VEGETATIVE CHARACTERISTICS, QUALITY AND YIELD OF BROCCOLI
...Show More Authors

This field experiment was conducted at Research Station B, Department of Horticulture and Landscape Engineering, College of Agricultural Engineering Sciences, University of Baghdad, Jadiriyah during the fall season of 2019-2020 to evaluate the effect of cultivation dates and soil fertilization source on the growth, yield and quality of broccoli. A split plot design within the RCBD design with three replicates was applied as the Max F1 hybrid broccoli seedlings were transferred to the field at two dates 25, Sep. 2019 and 15, Oct. 2019, which were symbolized as A and B, respectively, and occupied at the main plot. After two weeks of cultivation, the soil fertilizers were applied three times during the season in 20 days between each applicati

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref