Do you want to publish a course? Click here

نقوم أولا بالتحدث عن الحوسبة السحابية بصورة عامة إضافة الى المشاكل الأساسية التي تواجهها ونركز على المشاكل المتعلقة بالsecurity , ومن ثم نقوم بدراسة حالة الهجمات من النوع DOS وكيفية توظيف بعض تقنيات تنقيب المعطيات للكشف عنها والتعامل معها .
The current research aimed to recognize the level of psychological security among a sample of Tishreen university students. In order to achieve the objective of this research, Shkeer's psychological security scale was applied, which its factor str ucture was investigate by the researcher in a previous study. The scale was used for data collection, and in year 2017-2018, a sample of (233) students participated in the research. The results showed that the level of students’ psychological security is medium, and there is no difference between males and females, but there are differences according to the specialty, especially in “practice life”, where that the students of practice specialty showed higher feeling of psychological security than the students of theoretic specialty.
Financial security occupies an important role in achieving economic development by finding the sources of funding and organize the mechanism of subscription on the shares And issue it. Damascus security exchange consider one of the best Arabic exc hange Securities and in spite of the current Syrian events the security maintained on good level of performance despite the lack of the listed companies and that cause to lack of diversity although this security experience many obstacles but it can be solved and that lead to increasing the participation of this security in the economic development. In this research was rely on the curriculum descriptive analytical get to know the market financial market Damascus Securities through reports issued by the data of the securities and concluded search to the limited role played by the market in the process of economic development and not the variety of securities denied companies of finding the sources of funding their investment and that all the constraints facing the market can be exceeded and attention to the market and that would raise the economic growth rate.
This research is an attempts for studying security considering it as an phenomenon in society, which must be focused on, and work on the application of sociological analysis tools for research and study.Especially as security-related problems and c oncerns become an integral part of our lives at the individual and collective levels, which also influence the shaping of social relations, whether through discourse or practice.Therefore, the primary objective of the research is to gather all the data related to the general dimensions of what we can call sociology of security; to deal with security as a basic social process, subject to change, without which human life can become in danger.
The present research was designed to investigate the factor structure of Shkeer's psychological security scale (2005), by using the exploratory factor analysis. the psychological security scale of shkeer consists of four dimensions: (individual bu ilding and future vision (14 items), general and practice life (18 items), temperament (10 items), social relationships and social interaction (12 items). The researcher used the descriptive method, and the research sample was chosen randomly, while the data were collected from (415) students of Tishreen University. The research revealed that the psychological security consists of six factors, which had explained (52.91%) of total variance of items: The first factor: future vision and includes 14 items. The second factor: social relationships and includes 7 items. The third factor: temperament and includes 7 items. The fourth factor: practice life and includes 5 items. The fifth factor: general life and includes 5 items. The sixth factor: social interaction and includes 4 items. The researcher suggests that more studies should be done to investigate the factor structure of the psychological security scale on different Syrian samples.and proposes to study the relationship between psychological security and some variables.
Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign looking for patterns in financial transactions to discover illegal activities. From this perspective it wa s just a matter of time for the discipline to reach the important area of computer security This research presents a collection of research efforts on the use of data mining in computer security.
WLANs have evolved into the best choice in a number of situations such as government institutions and airports, but because of the open transport in these networks increased the possibility of security attacks, which required the use of security prot ocols to protect the network and to protect users. This research examines and evaluates the impact of security protocols on WLAN performance in order to select the optimal protocol, the impact of these protocols on network performance has been evaluated by adding those Protocols to open source GloMoSim environment, And recent simulation results show that the performance of these protocols are varies according to the environment applied within them, noting that there is no effective Protocol in all environments, i.e. the suitable Protocol in an environment may be unsuitable in other ones. After comparing performance results in simulations with performance results in the real network, we can see that the best performance protocol is WEP. Also, The best protocol for both performance and security is the WPA2. Hence, our choice to one of the security protocols depends on what we want to secure in the level of protection and the performance of the network.
The research aims to identify the correlation between learned helplessness and psychological security، And knowledge of the differences between the mean scores of the respondents to the learned helplessness scale and psychological security scale according to the variables of sex and school year. The application of the learned helplessness scale prepared by Hanan Aldaher and psychological security scale prepared by Fahed Aldilim on a sample which consist from (277) of open learning Kindergarten students in the college of education at the University of Damascus، for the year (2016_2017).
Device to device Communications (D2D Communications) is a new promising technology, that is used to increase data exchanged volume, to expand the coverage area of base stations, core network data offloading, and to move to new frequency bands that have not been used in mobile networks before.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا