The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The role of the academic institution” depending on its intellectual origins on the ideas of Renaissance and Enlightenment philosophers such as Hobbes, Locke, Rousseau and Kant, after mixing it with the critical style of the Frankfurt School. While the Paris School deals with “globalization of security”, “collection and analysis”, and “The link between internal and external security”. Its intellectual origins are based on the approaches of Michel Foucault and Pierre Bourdieu.
Objective: To know the impact of social networks on the mental health of adolescents in the city of Diwaniyah.
Methodology: A descriptive cross-sectional study was conducted on adolescents in preparatory schools in ALDiwaniyah
City Center, for the period from Jun 26, 2015 through to October 20, 2015. The schools were
selected from using Probability sampling (240 random samples) six schools were selected from 32 schools (20 %
from total number) the schools were chosen by writing the names of all schools on a pieces of paper and put in
bags. Then, selected six schools random, three boys schools (2 preparatory and 1 secondary) three girls schools
(2 preparatory and 1 secondary), then I chose the sample the students in grad
The tremendous benefits of using cellular phones, which began to increase and unprecedented spread worldwide last decade, were accompanied by harmful effects on the environment due to the increase in electromagnetic radiation (EMR) which be emitted from mobile phone towers. This effect on humans, animals, and plants, which is considered a form of environmental pollution, was sensed by developed countries and Environmental protection organizations. These countries have established restrictions and enacted laws to reduce their negative impact on living beings. The field survey included six major hospitals and 38 schools were distributed over the central neighbourhoods in Al-Najaf city. The results showed that power density (PD) measurement
... Show MoreAbstract
The aim of the research is to identify the role of ethical leadership in achieving comprehensive quality standards in public education schools in the Al-Ardha governorate. To achieve this goal, the descriptive approach was used, the researcher developed a questionnaire consisting of (35) items, divided into two sections: the first one is related to ethical leadership includes (17) items, and the second section relates to total quality management includes (18) items. The research sample consisted of (405) teachers from the stages of public education. The results showed that the level of ethical leadership practice (ethical personal characteristics, ethical administrative features, teamwork, and human rela
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The aim of the current research is to know the degree to which middle school teachers and female teachers in the southern border schools use electronic educational alternatives in the field of education from their point of view and its relationship to some variables, and to achieve this goal, a random sample of (200) teachers was selected in southern border schools, and a questionnaire was prepared to collect The data, as well as the descriptive approach was used to achieve this goal. T-test and analysis of variance were used for the statistical treatment. The results concluded that the educational courses provided to male and female teachers are not sufficient. It has also been concluded that the use of electronic educational alternativ
... Show Moreإساءة استعمال حقوق الملكية الفكرية
Islamic mysticism is one of Islamic philosophy fields, which originated and evolved in the light of Islam and civilization; It has received numerous and extensive studies, academic or specialized research, diversified approach and style and mixed up the views and numerous sects and all of them tried to clarify various aspects of the truth, and we discussed this; One of these Studies that have tried to deal with an important aspect of it and the ideology roots of this aspect; some theory was believed to be an Islamic experience which has pure introduced ideas, direction and morality of the essence of Islam itself