The research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of the administrative and clear in his work to receive it ambiguity in the roles Except Exclusive entrusted to him, which contributed to achieving the basic goals of the organization in which it operates, and recommended the researcher: the establishment of multi-tasking administrative leadership in the administrative organization of training courses at the Higher Institute of security and administrative development. The leader of the administrative and clear in his work to receive it ambiguity in the administrative roles assigned to it, contributing to the achievement of the basic goals of the organization in which it operates, the need for attention to the organization of time and administrative leadership because time is an important resource should be exploited in assisted to complete its work within the timings required from him.
In this research work an attempt has been made to investigate about the Robustness of the Bayesian Information criterion to estimate the order of the autoregressive process when the error of this model, Submits to a specific distributions and different cases of the time series on various size of samples by using the simulation, This criterion has been studied by depending on ten distributions, they are (Normal, log-Normal, continues uniform, Gamma , Exponential, Gamble, Cauchy, Poisson, Binomial, Discrete uniform) distributions, and then it has been reached to many collection and recommendations related to this object , when the series residual variable is subject to each ( Poisson , Binomial , Exponential , Dis
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThe 3-aminoacetophenone and 4-aminoantipyrine were used as precursors to prepare new six ligands. The three new ligands (L1,L2 and L3) were synthesis by reacting one mole of 3-aminoacetophenone with one mole of (Acetyl chloride), (benzoyl chloride), (4-methoxybenzoyl chloride) and ammonium thiocyanat in acetone as a solvent, they are:- L1 (AAA) =[N-(3-acetylphenylcarbamothioyl)acetamide] L2 (BAA) =[N-(3-acetylphenylcarbamothioyl)benzamide] L3 (MAA) =[N-(3-acetylphenylcarbamothioyl)-4-methoxy benzamide] Also three new derivatives of 4-aminoantipyrine were synthesis by reacting one mole of 4-aminoantipyrine with one mole of (Acetyl chloride), (benzoyl chloride), (4-methoxybenzoyl chloride) and ammonium thio
... Show MoreThe current study used extracts from the aloe vera (AV) plant and the hibiscus sabdariffa flower to make Ag-ZnO nanoparticles (NPs) and Ag-ZnO nanocomposites (NCs). Ag/ZnO NCs were compared to Ag NPs and ZnO NPs. They exhibited unique properties against bacteria and fungi that aren't present in either of the individual parts. The Ag-ZnO NCs from AV showed the best performance against E. coli, with an inhibition zone of up to 27 mm, compared to the other samples. The maximum absorbance peaks were observed at 431 nm and 410 nm for Ag NPs, at 374 nm and 377 nm for ZnO NPs and at 384 nm and 391 nm for Ag-ZnO NCs using AV leaf extract and hibiscus sabdariffa flower extract, respectively. Using field emission-scanning electron microscopes (FE-
... Show MorePreparation of Carboxy Methylated mPEG-Block-(4-Dodecyl Anilide) Copolymers and Their Visco Metric and Surface Tension Properties in THF