For the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreThe media, especially the satellite channels in our time, are one of the most important pillars of daily life, public and private, for society and people, and are considered by sociologists and sociologists as one of the most important factors of social upbringing and the most important, as a result of the technological and technological development of the media as well as increasing their numbers and vertical and horizontal expansion locally, As well as entering into the lives of individuals and people and leading them to important sites within their interests and preferences, not to mention the long time spent exposure to those media and benefit from the programs offered or broadcast. , The problem of this research is that there is a l
... Show MoreTo identify the fungi associated with water hyacinth (Eichhornia crassipes [Mart.] Solms), an aquatic weed, which presents in Tigris river from Baghdad south ward. Five regions from middle and south of Iraq (Al-Noumanya, Saeid Bin-Jubier, Al-Azizia, Al-Reyfay and Al-Hay) were selected for this study. Twelve fungal species were isolated. Alternaria alternata, Acremonium sp and Cladsporium herbarum, were the most frequently species (91.66 % ,50 % and 25 %) respectively. The fungi Alternaria alternata, Acremonium sp. and Phoma eupyrena were more aggressive to water hyacinth as (91.66%,83,33%, and 75%) in pathogenicity test.
Background׃ Halitosis is a common condition and is most often caused by a buildup of bacteria in the mouth because of gum disease, food, or plaque. It can result in anxiety among those affected, it is also associated with depression and symptoms of obsessive compulsive disorder. The aim of this study isto assess the prevalence of self-reported halitosis and associated factors (dental plaque, gingival condition and dental caries) in 15 years old male students in Karbala city in Iraq. Additionally, we studied adolescents’ concern with their own breath and whether anyone had ever told them that they had halitosis. Methods׃ A cross sectional observational survey was conducted to15 years old high school students from public and p
... Show MoreFusarium wilt causes economic losses on tomatoes every year. Thus, a variety of chemicals have been used to combat the disease. Pesticides have been effective in managing the disease, but they keep damaging the environment. Recently, eco-friendly approaches have been used to control plant diseases. This study aimed to achieve an environmentally safe solution using biological agents to induce systemic resistance in tomato plants to control Fusarium wilt disease caused by Fusarium oxysporum f.sp. lycopersici (FOL) in the greenhouse. The pathogen (FOL) has been molecularly confirmed and the biological agents have been isolated from the Iraqi environment. The effectiveness of the biological agents has been tested and confirmed. Results showed t
... Show MoreThe aim of this work is studying many concepts of a pure submodule related to sub-module L and introducing the two concepts, T_pure submodule related to submodule and the crossing property of T_pure related to submodule. Another characterizations and study some properties of this concept.
Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.
In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas
... Show More