Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has suffered at the present time from weakness, weakness and decline to the lowest levels of civilized backwardness in organizing the society and its social security, on the contrary of what it was the Islamic civilization, because of our distancing from the divine laws and his march behind Western ideas that want to destroy the prosperous Islamic civilization, and make Islamic societies not religious I chose an important topic at the present time, perhaps to explain to Islamic societies what they were missing, which is (the organization of society and its impact on social security), after I saw the chaos that afflicted Muslims and a torrential torrent that was from the West and their followers.
After this introduction, this research included a preamble, then defined the organization and the corresponding terms. To him, then I showed the importance of the organization, its goals and its reasons, then clarified the interconnection between organization and social security, and showed the impact of the organization and its importance in society, then after the conclusion, then the list of sources that I used in this research, and God is the success.
Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreAbstract
The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreAbstract
This study aims to identify the social and psychological abuse towards elderly people by others, to identify the difference of social and psychological abuse towards elderly by others according to the variable of gender (male and female). Additionally, to identify the difference of social and psychological abuse towards elderly by determining the one who is responsible of abusing (son, daughter, spouse, etc.). To achieve this aim, the researcher designed a scale to identify the social and psychological abuse towards elderly by others. The results showed that this sample exposed to psychological abuse by different sides due to lacking of powers. Besides, the result showed that there are no signifi
... Show MoreThis study aimed to show the extent of compliance with the income taxpayer to provide tax returns and increase the speed of collection of these taxes in addition to increasing confidence in Income Tax department and reduce the number of cases transferred to the courts and promote taxpayer awareness in charge of the importance of system self-assessment, and study sought to investigate the effect of the existence of records documents, technical audit, and computational audit and documentary audit on income tax collections in Jordan, from the point of view of Jordanian income tax auditors ,results shows there's a strong relation between these variables and Income Tax collections.
The purpose of this study is to examine the effect of human resource diversity management practices on achieving entrepreneurship in Jordanian public universities. To achieve the aims of the study, a well-designed questionnaire was used for collecting data. The population of the study was (7433) faculty members (including different ranks such as professors, associate professors, assistant professors and lecturers) in Jordanian public universities. The study sample was selected through the use of a random sample, the questionnaire is distributed to a sample (of 400 with the percentage of 5%) selected by using a random sampling (350) copies of the questionnaire were collected, reaching about (87.5%) out of the sum total of the dist
... Show MoreThe research aims to know the extent of the impact of the risks of foreign exchange centers represented in commitment risks, liquidity risks, and exchange rate risks on the continuity of the economic unit. The research in the light of its presentation of the intellectual, cognitive and applied contributions about the risks of foreign currency centers and the continuity of the economic unit, and represented the research community in the banking sector, and the sample included nine private commercial banks listed in the Iraq Stock Exchange, and they relied on the research on a time series consisting of four years that extended from one year 2017 to 2020. The research problem was the impact of the risks associated with foreign currency cent
... Show MoreThis research is entitled (civil society in Islamic political thought) which is an intellectual approach with theories of governance in Islam) to be as an attempt to clarify the confusion between mandatory and governorship text basis, and the extent of the nation’s movement within the framework of guiding to translate requirements of the responding towards the civil state project through civil visions according to the Islamic perspective.
In other words, It is the relationship of man and society in one hand and with an authority with other hand , according to an attempt vision that is to emphasize that Islamic religion can manage modern society and can prove legal philosophical reason
... Show More