Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the effectiveness of the applied method was verified through an example.
The research risk of flooding on six water basins located in the eastern part of the western plateau, reached total area of the basin (22,998.9 km 2), has reached all the Basin area (basin to time 7056.1 km2 basin by 3585 km 2, Bath Alheiazi 6404 km 2, Abu beasts 544.1 km2 basin Abu Shannan 144.6 km 2, Bath Valley Faraj 5265.1 km 2), where it was specifically spatial degree of this risk by studying some of the hydrological basin transactions directly related to operations spate runoff study area and the occurrence of flood risks on the surface of ponds.
Giardiasis is an infection caused by the protozoan flagellate parasite Giardia spp. in the intestine. G duodenalis, a species complex of diverse genotypes that tend to demonstrate host specificity, is responsible for most veterinary health related infections; production animals, companion animals, and wildlife can all be infected. Abdominal pain and diarrhea, typically accompanied by steatorrhea, are the most common symptoms of Giardiasis. Cysts or antigens in feces are commonly used to diagnose the disease. Treatment regimens vary and are dependent on the indication. Control methods must include hygiene measures. Despite direct evidence of Giardia sp transmission to humans via polluted water supplies, our analysis will focus on some r
... Show MoreThe increase globally fossil fuel consumption as it represents the main source of energy around the world, and the sources of heavy oil more than light, different techniques were used to reduce the viscosity and increase mobility of heavy crude oil. this study focusing on the experimental tests and modeling with Back Feed Forward Artificial Neural Network (BFF-ANN) of the dilution technique to reduce a heavy oil viscosity that was collected from the south- Iraq oil fields using organic solvents, organic diluents with different weight percentage (5, 10 and 20 wt.% ) of (n-heptane, toluene, and a mixture of different ratio
... Show MoreAbstracts:
Background: The oral cavity is a complex environment, both structurally and functionally, the hard and soft tissues are in close a proximity. Oral tissues subjected to wear throughout the life, that threatened the vitality of the pulp or increase the sensitivity of dentinal tubules. One of the common dental problems is loss of enamel or cementum, which stimulate the nerve ending in or near the pulp and manifested as pain sensation. Aim of the study: This study had done to evaluate the effects of 980nm diode Laser in diameters reduction of exposed dentinal tubules analyze the results and morphological changes of irradiated dentine surface by FE-SEM (field emission scann
... Show MoreAbstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.
This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)
... Show MoreThere has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show More