Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The researchers extracted the psychometric properties of the measure, including the virtual validity and reliability testing and re-testing in a way, andIt was then calculate the correlation coefficient between the scores of individuals in the first and second application using the correlation coefficient (Person) and the degree was (0.84) correlationcoefficient.The researchers used several statistical methods to process information, including the percentage equation Fisher and center-weighted and Pearson correlation coefficient and (t - test) for one sample, and (t - test) for two independent samples pouch Statistical Social Sciences (SPSS). The results showed that there are positive trends by university teachers around the security man in general. As for the differences between the sexes results showed that there were significant differences between the sexes (male and female) and the results were in favor of males. In light of the findings the researchers made a number of recommendations and proposals.
Background This study aimed to evaluate the efficacy of once-daily liraglutide as an add-on to oral antidiabetics (OADs) on glycemic control and body weight in obese patients with inadequately controlled type 2 diabetes (T2D). Methods A total of 27 obese T2D patients who received 7 months (0.6 mg/day for the first month, 1.2 mg/day for 3 months, and 1.8 mg/day for 3 months) of liraglutide treatment as an add-on to OADs were included. Data on body weight (kg), fasting plasma glucose (FPG, mg/dL), postprandial glucose (PPG, mg/dL), and HbA1c (%), were recorded. Results Liraglutide doses of 1.2 mg/day and 1.8 mg/day were associated with significant decreases in body weight (by 8.0% and 11.9%, respectively, p < 0.01 for each) and HbA1c (by 20.0
... Show MoreHuman Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreIn the current endeavor, a new Schiff base of 14,15,34,35-tetrahydro-11H,31H-4,8-diaza-1,3(3,4)-ditriazola-2,6(1,4)-dibenzenacyclooctaphane-4,7-dien-15,35-dithione was synthesized. The new symmetrical Schiff base (Q) was employed as a ligand to produce new complexes comprising Co(II), Ni(II), Cu(II), Pd(II), and Pt(II) metal-ions at a ratio of 2:1 (Metal:ligand). There have been new ligands and their complexes validated by (FTIR), (UV-visible), 1H-NMR, 13C-NMR, CHNS, and FAA spectroscopy, Thermogravimetric analysis (TG), Molar conductivity, and Magnetic susceptibility. The photostabilization technique to enhance the polymer was also used. The ligand Q and its complexes were mixed in 0.5% w/w of polyvinyl chloride in tetrahydrofuran
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreObjective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreBlastocystosis is symptomatic infection caused by the protozoal parasite Blastocystis , which resides in the intestinal tract of its hosts and it is one of the most common parasites reported in humans. It’s prevalence ranges between (30 - 50%) of the population in developing countries. This genus has a worldwide distribution and often the most commonly reported human intestinal protozoan in children and adults, even infect infants
Hemorrhagic insult is a major source of morbidity and mortality in both adults and newborn babies in the developed countries. The mechanisms underlying the non-traumatic rupture of cerebral vessels are not fully clear, but there is strong evidence that stress, which is associated with an increase in arterial blood pressure, plays a crucial role in the development of acute intracranial hemorrhage (ICH), and alterations in cerebral blood flow (CBF) may contribute to the pathogenesis of ICH. The problem is that there are no effective diagnostic methods that allow for a prognosis of risk to be made for the development of ICH. Therefore, quantitative assessment of CBF may significantly advance the underst