Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
This research aims to study and reveal the influence of Bauhaus principles in contemporary graphic design. The researcher determined the objective/spatial/temporal limit: Study of the Bauhaus influence in the design of the graphic poster in Germany in 2020. The theoretical framework in the first section dealt with (the emergence and factors of the emergence of the Bauhaus school and its characteristics), while the second topic dealt with (the intellectual, functional and aesthetic data of the Bauhaus School), after which the indicators that resulted from the theoretical framework were produced.
He mentioned four previous studies, one of them was discussed in detail. In the third chapter he defined the methodology, society, and sam
... Show MoreOne of the major problems in modern construction is the accumulation of construction and demolition waste; this study thus examines the consumption of waste brick in concrete based on the use of blended nano brick powder as replacement for cement and as a fine aggregate. Seven concrete mixes were developed according to ACI 211.1 using recycled waste brick. Nano powder brick at 0, 5, and 10% was used as a replacement by cement weight, with other mixes featuring 10, 20, and 30% partial replacement by volume of river sand with brick. The experimental results for replacement of cement with nano brick powder showed an enhancement in mechanical properties (compressive, flexural, and tensile strength) at 7,
Nanoparticles have gained considerable interest in recent times for oil recovery purposes owing to significant capabilities in wettability alteration of reservoir rocks. Wettability is a key factor controlling displacement efficiency and ultimate recovery of oil. The present study investigates the influence of zirconium (IV) oxide (ZrO2) and nickel (II) oxide (NiO) nanoparticles on the wetting preference of fractured (oil-wet) limestone formations. Wettability was assessed through SEM, AFM and contact angle. The potentials of the nanoparticles to alter oil-wet calcite substrates water wet, was experimentally tested at low nanoparticle concentrations (0.004–0.05 wt%). Quite similar behaviour was observed for both nanoparticles at the same
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThe study aims to identify the extent the academics in colleges of applied sciences are familiar with the themes of the national strategy of education 2040 in the Sultanate of Oman. The researchers used the descriptive approach, as well as they adopted a questionnaire with five dimensions as a tool for data collection, which was applied to (120) academics. The results showed that the academics of the applied colleges' familiarity with the National Strategy for Education 2040 in the Sultanate of Oman is average. The study also found that there were no statistically significant differences in the academics estimates of the extent of the Colleges of Applied Sciences academics’ familiarity with the themes of the National Education 2040 Str
... Show MoreThe military presence in the Gulf region after the British withdrawal from it in 1971 was one of the most important pillars of the American strategy to climb the ladder of global leadership, as the geostrategic features that the region enjoyed provided factors of controlling energy sources and global trade routes. The United States of America guarantees Western Europe and Japan the process of access to energy sources and the exclusion of its opponents from the region, especially the Soviet Union, and the growing American military presence in the Gulf after the invasion of Iraq in 2003. On the other hand, the region experiences many contradictions, some of which threaten its security, such as the exacerbation of disputes between its count
... Show MoreThe subject of the organizational Ambidexterity of the vital Topics through which it seeks organizations to provide mentalities renewable for their members and maintain its survival and continuity according to different organizational methods of access for strategic success. The research aims to demonstrate the impact of organizational Ambidexterity in achieving strategic success in the National bank of Iraq, and the questionnaire was prepared as a tool for collecting data and information through sample survey of (16) managers and heads of departments , The results were analyzed by using the statistical program (SPSS) in calculating mean, standard deviation, percent and test (f), coefficie
... Show MoreAbstract
The research aims to shed light on strategic cohesion and its dimensions represented by (strategic logic, organizational excitement, organizational founding, organizational synergy) and measure its impact on achieving organizational prosperity and its dimensions represented by (intellectual capital, innovation, infrastructure, organizational agility, sustainable competitive advantage). The research problem emerged by raising the main question, which is: Does the management of the researched company realize the importance of practicing strategic cohesion and its role in achieving organizational pros
... Show More