Preferred Language
Articles
/
txiykZgBVTCNdQwCOb8Q
Statistical Evalution of Safety Procedures and Chemical Security in Chemical Laboratories / College Ibn Al Haitham
...Show More Authors
Abstract<p>In order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. The forms were distributed to more than 90 persons who works in the chemistry department laboratories, of Ibn Al Haitham college of education, university of Baghdad. Statistical analysis is carried out using IBM Statistics SPSS, Version 24,2016. an internal consistency reliability was estimated using Cronbach’s alpha measuring scale, a value of 83.4 % was achieved it indicates a good reliability. The research emphasized a shortage in the application of safety procedures due to the lack of hardware requirements, as well as training. Control banding chemical uses in research and education laboratories, checklists and development of standard operating procedures are the most important things to achieve the safety in chemical laboratories.</p>
Crossref
View Publication
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Employment of Narrative Tradition In the Polemic Poems of Jarir , Al-Farazdaq and Al-Akhtal
...Show More Authors

The present study is an attempt to show how the three Umayyad poets ; Jarir , Al-
Farazdaq and Al-Akhtal have consciously and skillfully employed in their poetry som ancient
Arab legends ,historical events and wars as they provide atrue image of the values and
customs of the peoples who lived before them .
Their employed , how ever, takes avarying degrees depending, to alarge extent , an the
vast but personal knowledge of each poet the past tradition , and practices . Jarir ,in many
respects out , stands the first , Al-Farazdaq , the second and Al-Akhtal , the third .

View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Physical Education
Body Image and Its Relationship With Self&#8211;Confidence In Female College of Physical Education and Sport Sciences Students
...Show More Authors

سها علي حسين, هويدة إسماعيل إبراهيم, Journal of Physical Education, 2017 - Cited by 1

View Publication
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
The role and effectiveness of the United Nations Security Council in light of the competition of international powers: an analytical study
...Show More Authors

Abstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2006
Journal Name
College Of Islamic Sciences
Grammarians’ opinions on stopping and tilting in Al-Kanz by Al-Wasiti
...Show More Authors

Praise be to God, and may blessings and peace be upon our master and Prophet Muhammad and those who follow him, and may God be pleased with him

Taha is my guardian and whoever follows their path until the Day of Judgment. And after... The book (The Treasure in the Ten Recitations), written by Abu Muhammad Abdullah bin Abd al-Wasiti, who died in the year 710 AH, is considered one of the important books in recitations: because it included the universal custom that it contained in the books Al-Taysir by Al-Dani and Al-Irshad by Al-Falanisi, as the first of them was specialized.

Satisfy the second with the ten readings

May God bless my time, through His grace and generosity, to achieve this treasure and to publish it

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (8)
Scopus Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref