MRY *Khalid Sh. Sharhan, *Naseer Shukur Hussein, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreFine aggregates used for concrete works in Sulaymaniyah city frequently fail to meet the standard requirements for gradation and fineness modulus in cement concrete. This paper aims to critically evaluate gradation, fineness modulus, and clay contents of various natural sands produced and used for concrete work in the region. Sixteen field sand samples were collected from various sites in Darbandikhan (5 samples), Qalat Dizah (5 samples), Koysinjaq (5 samples), and Piramagroon (1 sample) confirming to ASTM D75. The field samples were parted into test specimens based on ASTM C702. Then, sieve analysis was carried out on the oven-dry test specimens in compliance with ASTM C136. The test results of fine aggregates wer
... Show MoreModern French novel has gained a distinctive status in the history of French literature during the first half of the twentieth century. This is due to many factors including the new literary descriptive objective style adopted by novelists like Alain Robbe – Grillet that has long been regarded as the outstanding writer of the nouveau roman, as well as its major spokesman, a representative writer and a leading theoretician of the new novel that has broken the classical rules of the one hero and evolved, through questioning the relationship of man and the world and reevaluating the limits of contemporary fiction , into creating a new form of narrative.
Résumé:
En vue de résu
... Show MoreThe present study is concerned with Biostratigraphy of the Early-Middle Miocene outcrops of Jeribe Formation in the Zurbatiyah area, Wasit Governorate, Eastern Iraq. Forty-two Samples collected from Shur Sharin and AL-Hashima outcrop sections. The fossil content is rich in large and small benthic foraminifera; Twenty-one species and genus are identified in this study, in addition to coral, gastropoda, pelecypoda, ostracoda, alge, echinoid and shell fragments. According to the presence of benthic foraminifera, two Biozone have been identified in the Jeribe: Austrotrillina asmariensis-Dendritina rangi Concurrent Zone and Borelis melo curdica range zone.The age of the Formation determined as Early-Middle Miocene depending on these Bioz
... Show More