Preferred Language
Articles
/
jperc-1398
The Psychological Security of Students in the Kindergarten Department
...Show More Authors

Abstract

The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of Drinking Waters’ projects in accordance with the standard Malcolm Baldrige Award for Excellence in the framework of total quality management / applied research in Water Department of Baghdad
...Show More Authors

The research aims to evaluate the selected projects from the water Department of Baghdad, according to a standard for total quality management and to achieve this goal , adopted the case study method to get to know how close or turn away those projects in the management of Standard Malcolm Baldrige Award for Excellence in Quality Management its comprehensive one scales the world's most famous in this area , in order to draw a general framework to evaluate how project management can benefit from this approach to modern management , input from the entrances of the comprehensive management reform and development.

Be standard Malcolm Baldrige Award of several elements: - leadership , strategic planning , foc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
The impact of the model and follows on the collection and Retention of fifth grade students (oiterary) in history
...Show More Authors

The first chapter the importance of research and need for education scientists see that the roots of the use of a specimen Wheatley in learning and teaching back to Grayson Wheatley, one of the largest supporters of a modern construction, which lay the groundwork for the specimen stage and the form in which it is. That was attributed to him, often called his name called while some educators based learning strategy on the issue. He sees the learner in this model make him a meaningful understanding of problems during his progress, thereby acting with his colleagues to find solutions to them in small groups. He

        Borders Search: Search by students is determined by th

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Effect of Using Computer in Getting and Remaining Information at Students of First Stage in Biology Subject
...Show More Authors

Effect of Using Computer in Getting and Remaining Information at Students of First Stage in Biology Subject MIAAD NATHIM RASHEED LECTURER Abstract The recent research goal is to know the influence of computer use to earn and fulfillment information for students of first class in biology material and to achieve that put many of the zeroing hypothesis by researcher as follow: There were no differences between statistical signs at level (0,05) between the average students' marks who they were study by using computer and between the average student ' marks who they were study in classical method of earning and fulfillment. The researcher chose the intentional of the medical technical institute that included of two branches the first class (A

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Psychological Work Environment's Effect on Workers' Productivity in Baghdad City
...Show More Authors

Objective: To evaluate the psychological work environment's effect on the workers’ productivity in Baghdad
City industries at Al-Rusafa and Al-Karkh Sectors.
Methodology: A descriptive evaluation design is employed throughout the present study from May 25th 2012
through January 7
th
, 2014. A purposive (non probability) sample is selected for the study which includes (500)
workers from industries at AL-Russafa and AL-Kerch sectors in Baghdad City. A questionnaire is constructed to
gather data which may assist to achieve the objective of the study. Content validity of the instrument is
determined through eliciting the opinions of a panel of (10) experts and the reliability through a pilot study by
using intern

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Nov 09 2025
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte, Issn 1886-8576, Vol. 17, Nº. 4, 2022, Págs. 183-190
Psychological Empowerment and its Relationship to Organizational Citizenship Behavior for Workers in the Olympic Committee Sports Federations
...Show More Authors

Autorías: Suhair Meteab Munaf, Ali Abdulateef Ali, Mohannad Salman Dawood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 4, 2022. Artículo de Revista en Dialnet.

View Publication
Scopus
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Teaching impact of the Reflex Learning Strategy on the Fifth Class Female Student Achievement of the Geography Content Material
...Show More Authors

 The research aimed to find the effectiveness of teaching impact of the reflex learning strategy on the fifth class female student achievement of the geography content material). The researcher adopted the null hypotheses (there are no statistically significant differences at (0,05) level between the women score mean of the experimental group student who has been taught by the cement material assigned by the reflex learning strategy, and that of the control group who have been taught by the traditional method on the achievement test. The researcher adopted the post-test experimental design to measure students’ achievement. The population of the present study has been limited to the fifth literary class female stud

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Deposit insurance system and its role in financial security for the period (2010-2018) Study the experiences of Selected countries with reference to Iraq
...Show More Authors

Founding a System to secure deposits and protecting the depositors is considered one of the important and exchanged subjects out there in the banking system/field in Iraq at the current time, and the reason behind the exchange and spread of this subject is due to the financial crisis of which the banking sector is suffering from and the stumbling of many banks, those factors have had led to the insecurity of the depositors and their mistrust towards banks, thus, it is necessary to create a system to secure deposits in which depositors would be compensated for the losses caused by the banks' failures. in addition, it could be a countermeasure system which maintains the banking stability, protects the rights of depositors and gains

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.