Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The research aims to measure the impact of envy on job stress because the topic of envy represents a negative emotion that exists at all organizational levels, which may cause stress in the work environment.
The Research problem is represented by the lack of perception of most of the faculty staff on the negative effects of envy on their well-being in the Technical College of Management - Baghdad, and what is the impact level of envy on their job stress.
To achieve this, the scale of envy was based on two dimensions (being envied, Envying others), While the job stress scale was based on seven dimensions (workload, conflict role, Family factors, work environment, work relationships
... Show MoreIn the present survey 18 species of endo and ecto-parasites were recorded during the examination of 50 Mus musculus (Linnaeus, 1758) among 10 localities in Erbil city, of which 7 species were protozoan and as follows : Chilomastix bettencourti (da Fonseca 1915)82%; Giardia muris (Filice, 1952) 68%; Tritrichomonas muris (Grassi,1879)36%; Entamoeba histolytica (Schaudinn,1903) 24%; Entamoeba coli (Grassi,1879)32%; Eimeria sp. 28% and Trypanosoma musculi (Kendall,1906)2%; and 8 species were helminthes as follows: 4 Cestodes: Rodentolepis nana (von Siebold, 1852) 8%; Hymenolepis diminuta (Rudolphi, 1819)2%; larval stage of Echinococcus granulosus (Batsch, 1786)8%, Cysticercus fasciolaris (Rudolphi, 1808)6%, 4 Nematodes: Aspiculuris tetrapter
... Show MoreThe aim of the study was extraction of arial part of Euphorbia cyathophora constituents with methanol and evaluate its effect on mitotic index and total chromosomal aberration bone marrow cell and spleen cell in mice 200 gm of E. cyathophora fine powder was defatted then extracted by cold maceration 80% ethanol for seven days. The extract was filtered and dried in a rotary evaporator then the dried extract was suspended with water and consecutively extracted using chloroform, ethyl acetate for each. The aqueous layer was then mixed with 100ml methanol. These fractions are dried under reduced pressure to obtain the dry extract. Twenty-four Albino mice were used for the experiment. The animals were divided into four groups: Gr
... Show MoreIn the present research, the nuclear deformation of the Ne, Mg, Si, S, Ar, and Kr even–even isotopes has been investigated within the framework of Hartree–Fock–Bogoliubov method and SLy4 Skyrme parameterization. In particular, the deform shapes of the effect of nucleons collective motion by coupling between the single-particle motion and the potential surface have been studied. Furthermore, binding energy, the single-particle nuclear density distributions, the corresponding nuclear radii, and quadrupole deformation parameter have been also calculated and compared with the available experimental data. From the outcome of our investigation, it is possible to conclude that the deforming effects cannot be neglected in a characterization o
... Show MoreThe present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and col
... Show MoreForensic accounting (FA) is an important tool in exposing financial manipulation and corruption within institutions, making the role of FA essential in the Iraqi judicial system (IJS). This role suffers from limited implementation due to the lack of specialized legislation and insufficient awareness of its importance. The role of FA in the IJS can be enhanced by enhancing professional training, amending university curricula to include FA, and developing legislation regulating this field. Furthermore, cooperation between courts and the FA should be strengthened to ensure adequate financial evidence (FE) in judicial cases. For example, the experiences of developed countries, such as the United States and the United Kingdom, demonstrate how FA
... Show MoreCervical carcinoma represent the second predominant cancer in female and there is a strong correlation between cervical cancer and the infection with high-risk types of HPV and expression the viral oncogenes. EMT is viewed as a vital advance in carcinoma development and ensuing metastasis. To evaluate correlation between the expression of Twist and HPV16 infection in a group of Iraqi patients with cervical carcinoma. A total of forty paraffin blocks included in this study which were divided into 30 sample of cervical cancer infected with HPV16and 10 sample of normal cervical tissues. The samples were subjected to immunohistochemical technique using Anti-Twist2 polyclonal antibody. The obtained data from this study indicate that majority of
... Show MoreAround 65 million individuals suffer from epilepsy worldwide, and when it is not properly treated, it is linked to higher rates of physical harm and mortality. Due to the requirement for long‐term therapy and the side effects of many medications, medication compliance is a significant issue. The purpose of this review was to summarize the findings of previous studies examining the quality of life (QOL), adherence, patient education, and medication knowledge, as well as the impact of a pharmacist‐led educational intervention. Additionally, to find out if these studies benefit epileptic patients, to find the appropriate method used to help them in all aspects of their lives, and to use these in future studies. A systematic and comprehensi
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreHuman Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show More