Preferred Language
Articles
/
txiykZgBVTCNdQwCOb8Q
Statistical Evalution of Safety Procedures and Chemical Security in Chemical Laboratories / College Ibn Al Haitham
...Show More Authors
Abstract<p>In order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. The forms were distributed to more than 90 persons who works in the chemistry department laboratories, of Ibn Al Haitham college of education, university of Baghdad. Statistical analysis is carried out using IBM Statistics SPSS, Version 24,2016. an internal consistency reliability was estimated using Cronbach’s alpha measuring scale, a value of 83.4 % was achieved it indicates a good reliability. The research emphasized a shortage in the application of safety procedures due to the lack of hardware requirements, as well as training. Control banding chemical uses in research and education laboratories, checklists and development of standard operating procedures are the most important things to achieve the safety in chemical laboratories.</p>
Scopus Crossref
View Publication
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 12 2023
Journal Name
مجلة السياسية والدولية /
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte

... Show More
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Steganographic scheme to avoid statistical Steganalysis
...Show More Authors

significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.

View Publication Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Statistical analysis from a Gender perspective
...Show More Authors

This research is a theoretical study that deals with the presentation of the literature of statistical analysis from the perspective of gender or what is called Engendering Statistics. The researcher relied on a number of UN reports as well as some foreign sources to conduct the current study. Gender statistics are defined as statistics that reflect the differences and inequality of the status of women and men overall domains of life, and their importance stems from the fact that it is an important tool in promoting equality as a necessity for the process of sustainable development and the formulation of national and effective development policies and programs. The empowerment of women and the achievement of equality between men and wome

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Irrigation And Drainage Engineering
Hydraulic and Statistical Analyses of Design Emission Uniformity of Trickle Irrigation Systems
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation of accounting procedures for joint arrangements in the Iraqi environment and their reflection on the quality of financial reporting
...Show More Authors

The research aims to assess the local accounting procedures related in one of developments that have taken place, and largely on the structure of the Iraqi economic activity. But a partnership between the (public and private sector), or one of the types of joint arrangements, and through the use of the analytical method and extrapolate the reality of the accounting treatments in Company research sample. Research found to a number of conclusions that the unified accounting system applied in the economic units that deal with contracting joint arrangements formula suffers from obvious shortcomings, and reflected the common arrangements suffer from obvious shortcomings. and reflected on the quality of financial reporting, and the urgent need

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jun 30 2018
Journal Name
College Of Islamic Sciences
Criticism of poetry in the book of mortality Ibn Khalkan (681 AH)
...Show More Authors

The researchers go to the classification of the book (mortality of objects) of Ibn Khalkan in the books of biographies, translations and history and consider it an important dictionary in translations and this is not disputed, but none of them did not reveal clearly about the literary phenomenon in which it is clearly related and the size of this phenomenon, it has come in the side This research sought to investigate this critical encyclopedia, which occupied a large area of ​​the historical framework of the book as we rarely found a figure in which did not turn - in extrapolation of translations - in the orbit of poetry as well as the great celebration of poetic speech during Translation has reached a number Perhaps the most promine

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of The College Of Languages (jcl)
Nature of a holy book in the poetry of Ibn Arabi Mohi
...Show More Authors

The paper discusses the lack of a uniform definition of politeness due to the constant tension between its universality and language specificity, and argues that some of the theoretical debate could be resolved if the distinction between politeness as a commonsense notion and politeness as a theoretical construct were clearly addressed and acknowledged in the research.

View Publication Preview PDF