Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicious attacks. In this manuscript, a correspondence model is designed to discuss the algorithm in the environment of wireless communication systems and distributed computing by adopting the protocol data enhancement to the network using structured construction and diversity algorithm to improve the effectiveness of the intrusion detection system. Next, a multi-label convolutional neural network model is used to detect business transactions. An CNN was trained on the WSN-DS dataset using 5-Fold in CV technique with three hidden layers. The highest Precision values 0.951 of Grayhole attack for multi-classification.
In light of the intellectual and technological progress within the current developments of time, as well as the emergence of digital tools and means of display and communication, which had a major role in the shifts of the time of globalization in various commercial and economic fields, as well as areas of transferring the design image and its stages of development to customers and the convergence of views between the customer and the interior designer, which are the most important pillars of the design process As a whole, and accordingly, there is an urgent need for a process of intellectual balance between them through digital tools from the technical side and through social media from the intellectual side. Customer comments via socia
... Show MoreToday the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The po
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreAbstract
This research aims to design a multi-objective mathematical model to assess the project quality based on three criteria: time, cost and performance. This model has been applied in one of the major projects formations of the Saad Public Company which enables to completion the project on time at an additional cost that would be within the estimated budget with a satisfactory level of the performance which match with consumer requirements. The problem of research is to ensure that the project is completed with the required quality Is subject to constraints, such as time, cost and performance, so this requires prioritizing multiple goals. The project
... Show MoreCoaches and analysts face a significant challenge of inaccurate estimation when analyzing Men's 100 Meter Sprint Performance, particularly when there is limited data available. This necessitates the use of modern technologies to address the problem of inaccurate estimation. Unfortunately, current methods used to estimate Men's 100 Meter Sprint Performance indexes in Iraq are ineffective, highlighting the need to adopt new and advanced technologies that are fast, accurate, and flexible. Therefore, the objective of this study was to utilize an advanced method known as artificial neural networks to estimate four key indexes: Accelerate First of 10 meters, Speed Rate, Time First of 10 meters, and Reaction Time. The application of artifi
... Show MoreResumen:
La traducción de los dos verbos ser y estar no es una tarea tan simple como piensan muchas personas, sino es una de las complicadas y difíciles tareas, ya que el traductor tiene que saber y perfeccionar los correctos casos gramaticales relacionados con esos dos verbos auxiliares tanto el verbo ser como el verbo estar, especialmente en la frase nominal para que pueda dar una clara y correcta traducción. Usados con el mismo adjetivo, "ser" comunicará una cualidad que es parte de la identidad o naturaleza del sujeto, mientras que "estar" comunicará un estado o circunstancia del mismo. Este e
... Show MoreDiyala river is the most important tributaries in Iraq, this river suffering from pollution, therefore, this research aimed to predict organic pollutants that represented by biological oxygen demand BOD, and inorganic pollutants that represented by total dissolved solids TDS for Diyala river in Iraq, the data used in this research were collected for the period from 2011-2016 for the last station in the river known as D17, before the river meeting Tigris river in Baghdad city. Analysis Neural Network ANN was used in order to find the mathematical models, the parameters used to predict BOD were seven parameters EC, Alk, Cl, K, TH, NO3, DO, after removing the less importance parameters. While the parameters that used to predict TDS were fourte
... Show MoreThis study deals with the role that social work profession plays in all its fields to reduce social extremismat home, or school or within society. The study aims to: examine the historical roots of social work in the Iraqi society, investigate the objectives of the developmental role of social work, review the theories of social extremism, its characteristics, and causes, and to analyze the developmental role of social work to limit social extremism. To meet the objectives of the study, a descriptive analytical approach has been adopted. It involves using the social sampling survey method, i.e., a questionnaire tool in the University of Baghdad community-College of Media. The sample was randomly selected to include (100) students from th
... Show More