Iraqi agriculture faces a major water problem, affecting cultivated areas, agricultural production, farmers’ incomes and food security. However, the results achieved in rationalizing the use of irrigation water are still limited and do not match what they should be in order to meet this serious challenge. The study aimed to provide a vision for the development of the effectiveness of the dissemination of innovations to rationalize the use of irrigation water in Iraqi agriculture. In light of the framework of the dissemination of agricultural innovations, factors related to their effectiveness, and the summary of the Iraqi experience in the field of dissemination of modern irrigation
The research deals with the collection of Allamah Ali al-Nuri’s guidance on readings, which he included in his book (Ghaith al-Naf’ fi al-Qira’at al-Sabe) and singled out it in a separate study, commenting on what needs to be commented and a statement of his guidance, and it consists of an introduction, and three chapters, the first: for the translation of Allamah Sfaxi, and the second: To define the science of guidance, its origins and authorship, and the third: to mention the readings that Al-Safaqi drew from Surat Al-An’am to the end of Surat Hud, followed by the conclusion of the research, then the index of sources and references, and I followed the inductive-analytical method in the research.
Among his most important
... Show MoreResin-modified glass ionomer cement tends to shrink due to polymerization of the resin component. Additionally, they are more prone to syneresis and imbibition during the setting process. This
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show More