Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The researchers extracted the psychometric properties of the measure, including the virtual validity and reliability testing and re-testing in a way, andIt was then calculate the correlation coefficient between the scores of individuals in the first and second application using the correlation coefficient (Person) and the degree was (0.84) correlationcoefficient.The researchers used several statistical methods to process information, including the percentage equation Fisher and center-weighted and Pearson correlation coefficient and (t - test) for one sample, and (t - test) for two independent samples pouch Statistical Social Sciences (SPSS). The results showed that there are positive trends by university teachers around the security man in general. As for the differences between the sexes results showed that there were significant differences between the sexes (male and female) and the results were in favor of males. In light of the findings the researchers made a number of recommendations and proposals.
Tetradentate complexes type [M (HL) 2] were prepared from the reaction of 2-hydroxy -1, 2-diphynel-ethanone oxime [H2L] and KOH with ( Mn II, Fe II, Co II, Ni II , Cu II and Hg II ), in methanol with (2:1) metal: ligand ratio. The general formula for Cu II and Mn II complexes are [M (HL) 2 Cl.H2O] K, for Co II [Co (HL) 2. H2O] and [M (HL) 2] for the rest of complexes. All compounds were characterised by spectroscopic methods, I.R, U.V-Vis, H.P.L.C, atomic absorption and conductivity measurements chloride content. From the data of these measurements, the proposed molecular structures for Fe II and Hg II complexes are tetrahedrals, while Mn II and Cu II complexes are octahedrals, Ni II complex adopting square planar structure and the complex
... Show MoreThe financial crises that occurred in South East Asia and America, and the discovery of the financial and administrative corruption that affected these companies, which led to the crisis. Since then, organizations and institutions interested in accounting have begun new ways to further rationalize the management of these companies. Hence the concept of governance, which means good governance. Al-Susiya confirmed its adoption of the financial reporting standards and adopted internal and external auditing for the purpose of increasing the reliability and credibility of the financial and reports that increase the confidence of investors in making their investment decisions in the financial markets The study dealt with the contributi
... Show Moreتطوير الاداء الاداري لرؤساء الاقسا العممية في جامعة واتسط في ضوء وظائفيا الادارية د ا رسة ميدانية ىدفت تطوير الاداء الاداري لرؤساء الاقسا العممية في جامعة واسط في ضوء وظائفيا الادارية وت بناء استبانة تكونت 410 وعمى مجموعة مف الخب ا رء مف عمداء ومعاونيف :/ مف = 8 فقرة اذ ت تطبيقيا خلاؿ العا الد ا رسي 4109 اساتذة ورؤساء اقسا باستخدا اسموب دلفي بواقع جولتيف وباعتماد نسبة اتفاؽ 1<% وكاف عددى 81 خبي ا رً وتوصمت الد ا رسة الى
... Show MoreTheoretical calculation of the electronic current at N 3 contact with TiO 2 solar cell devices ARTICLES YOU MAY BE INTERESTED IN Theoretical studies of electronic transition characteristics of senstizer molecule dye N3-SnO 2 semiconductor interface AIP Conference. Available from: https://www.researchgate.net/publication/362813854_Theoretical_calculation_of_the_electronic_current_at_N_3_contact_with_TiO_2_solar_cell_devices_ARTICLES_YOU_MAY_BE_INTERESTED_IN_Theoretical_studies_of_electronic_transition_characteristics_of_senstiz [accessed May 01 2023].
In addition to being a religious book with high human and moral themes, Nahj al-Balagha is considered a mirror of Arab culture and a literary masterpiece at the height of eloquence and eloquence, and because proverbs in the form of short, concrete and understandable phrases for everyone, experiences, thoughts and convey ideas, Imam Ali (AS) used it to facilitate the understanding of various political, social and moral concepts. In this article, we intend to criticize the way Dashti, Shahidi and Foladvand translated it by using Newmark's model due to the importance and cultural reflections of proverbs in understanding the cultural atmosphere governing Nahj al-Balagheh. In his evaluation model, Newmark divides cult
... Show MoreBlockchain technologies have grown in popularity over the last few years, with various experts touting the technology's potential applications in a range of businesses, markets, organizations, and governmental institutions. In the brief history of blockchain, an astounding number of incredible implementations have been done in terms of how it may be utilized and the potential effect it may have on a range of sectors. And, because of the great number and complexity of these characteristics, addressing the blockchain's potential and complications can be difficult, especially when seeking to address its purpose and fit for a certain activity. The blockchain's practical skills in fixing multiple challenges that are currently prevent
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe present paper discusses one of the most important Russian linguistic features of Arabic origin Russian lexes denoting some religious worship or some political and social positions like Qadi, Wally, Sultan, Alam, Ruler, Caliph, Amir, Fakih, Mufti, Sharif, Ayatollah, Sheikh.. etc. A lexical analysis of the two of the most efficient and most used words of Arabic origin Russian lexes that are “Caliph and Sheikh” is considered in the present study. The lexicographic analysis of these words makes it possible to identify controversial issues related to their etymology and semantic development.
The study is conducted by the use of the modern Russian and Arabic dictionary, specifically, (Intermediate lexicon Dictionary
... Show More