The world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization, so I chose An important subject at present may explain to Muslim communities what they were overlooked, which is (the organization of society and its impact on social security) ..
.
The purpose of this study is to examine the effect of human resource diversity management practices on achieving entrepreneurship in Jordanian public universities. To achieve the aims of the study, a well-designed questionnaire was used for collecting data. The population of the study was (7433) faculty members (including different ranks such as professors, associate professors, assistant professors and lecturers) in Jordanian public universities. The study sample was selected through the use of a random sample, the questionnaire is distributed to a sample (of 400 with the percentage of 5%) selected by using a random sampling (350) copies of the questionnaire were collected, reaching about (87.5%) out of the sum total of the dist
... Show MoreThis study aimed to show the extent of compliance with the income taxpayer to provide tax returns and increase the speed of collection of these taxes in addition to increasing confidence in Income Tax department and reduce the number of cases transferred to the courts and promote taxpayer awareness in charge of the importance of system self-assessment, and study sought to investigate the effect of the existence of records documents, technical audit, and computational audit and documentary audit on income tax collections in Jordan, from the point of view of Jordanian income tax auditors ,results shows there's a strong relation between these variables and Income Tax collections.
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show More