This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreA simple, accurate, precise, rapid, economical and a high sensitive spectrophotometric method has been developed for the determination of tadalafil in pharmaceutical preparations and industrial wastewater samples, which shows a maximum absorbance at 204 nm in 1:1 ethanol-water. Beer's law was obeyed in the range of 1-7?g/ mL ,with molar absorptivity and Sandell ? s sensitivity of 0.783x105l/mol.cm and 4.97 ng/cm2respectively, relative standard deviation of the method was less than 1.7%, and accuracy (average recovery %) was 100 ± 0. 13. The limits of detection and quantitation are 0.18 and 0.54 µg .ml-1, respectively. The method was successfully applied to the determination of tadalafil in some pharmaceutical formulations
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreThe measurement data of the raw water quality of Tigris River were statistically analyzed to measure the salinity value in relation to the selected raw water quality parameters. The analyzed data were collected from five water treatment plants (WTPs) assembled alongside of the Tigris River in Baghdad: Al-Karkh, Al-Karama, Al-Qadisiya, Al-Dora, and Al-Wihda for the period from 2015 to 2021. The selected parameters are total dissolved solid (TDS), electrical conductivity (EC), pH and temperature. The main objective of this research is to predicate a mathematical model using SPSS software to calculate the value of salinity along the river, in addition, the effect of electrical conductivi
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually ignore the importance of usability of the password for the users. The more complex they are the more they frustrate users and they end up with some coping strategies such as adding “123” at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, and more importantly there is no scientific basis
... Show More