Preferred Language
Articles
/
jcoeduw-1331
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educational system, indeed, is closely connected with the culture of society. The study also gives an in-depth look at some concepts, mainly education, security, educational security, and sources of threat such as novelties, alternative religions, ethical system destruction, and curriculum distortion. It also attempts to provide a cursory account of the different effects of educational threat and presents some suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 11 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Dynamic Background Subtraction in Video Surveillance Using Color-Histogram and Fuzzy C-Means Algorithm with Cosine Similarity
...Show More Authors

The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Auditing performance of revenue sources in the Non-Governmental Organizations And its role in achieving financial sustainability
...Show More Authors

Researching performance audits according to the dimensions of financial sustainability in light of the scarcity of resources and economic and social transformations in the business environment is of utmost importance in the non-profit non-governmental organizations in achieving the goals and correct the path and address deviations, and help them in improving the outputs of processes and associated procedures and capacity The research was based on the hypothesis that the existence of a performance audit program in accordance with the dimensions of financial sustainability leads to the measurement of the commitment of the Olympic Committee. National Iraqi indicators of financial sustainability of the dimension of revenue in order to improv

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 20 2019
Journal Name
Journal Of The College Of Education For Women
Educational Services Efficiency in Jalawla
...Show More Authors

The city of Jalawla is the administrative center of Jalawla district. It is located in the district of Khanaqin with a population of 62117 inhabitants in 2018. The city of Jalawla suffers from an imbalance in the geographical distribution of educational services among the residential neighborhoods. There are only two schools in the camp district According to the city's population, if the city of Jalawla needs eleven kindergartens and needs one primary school, eight middle schools, two preparatory schools, three secondary schools and two vocational schools. Despite the low share of the teacher or teacher for the number of students (25) students Enrollment in schools for the school of high school athletes and school students. Which determi

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Journal Of Educational And Psychological Researches
Activating the Role of Women Leaders in Educational Decision-Making in Educational Administrations in the Northern Border in Light of the Kingdom's 2030 Vision
...Show More Authors

This study aims at identifying the activation of the role of feminine leaders in educational decision-making in educational administrations in the Northern Borders Province in light of the Kingdom's vision 2030. It also aims to identify what educational leadership is, to study the conceptual framework of the contemporary education decision-making process, and to examine the reality of the problems of feminine leaders in educational decision-making in the educational administrations in the Northern Borders. In addition, it tries to develop a proposed vision to activate the role of feminine leaders in educational decision-making in Educational Administrations in the Northern Borders Province in light of Vision 2030. To achieve the objectiv

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2022
Journal Name
Al–bahith Al–a'alami
The Use of Social Networking sites in the Marketing of Values Analytical : Study of the Official Pages of the Ministry of Culture, Tourism and Antiquities and the Ministry of Labor and Social Affairs on Facebook
...Show More Authors

The social networking sites have brought about fundamental changes and a qualitative shift in the marketing industry and its strategies. The Iraqi ministries have used this site i.e. Facebook to spread and disseminate values in order to consolidate it in Iraqi society which has witnessed many changes in all aspects of life.

   The researcher studies the pages of both ministries to know the values contained in the publications of the pages of these two ministries, the quality of grooming as well as the forms in which these values are marketed.

     The researcher uses a survey method and content analysis for the publications of these two pages during the study period starting from January 1, 2

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Educational values prevailing in small games for kindergarten
...Show More Authors

The research aims to identify the educational values prevailing in the small kinetic games for the children of Riyadh, and to categorize the educational values of the kinetic games small children Riyadh. The research analyzed the content of a number of small kinetic games that included studied physical education at the two pre-kindergarten and stipulated by the Platform for kindergartens, which is being applied. The content analysis was used by analysts agreement with themselves over time (21) days. The agreement between the external researcher and analyst. The researcher used the Cooper to extract equation lab agreement between the researcher and the outside analyst, has reached agreement on determining factor idea and label values (0.8

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 02 2011
Journal Name
Journal Of Educational And Psychological Researches
Educational Activities and Its Role in Affirm Teaching Subject At The Pupils of Primary Stage
...Show More Authors

The first chapter includes introduce the research and the problem of the research that there are negligence of some educational institutions and schools management  , some parents and supervisors .Also there are some educators who believes that school activities are obstacles means to learning and prevent pupils from studying and understanding the subjects. That may due to social , psychological and educational reasons

The purposes of the researches come from the reports of supervision visits which indicate a lot of difficulties faced by pupils and teachers related to education activities  and its influence on in education  and the necessity of indentify these difficulties and remedy them

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref