Preferred Language
Articles
/
alkej-137
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Post a reflection on the capabilities of personnel programs A prospective study of a sample of the views of the staff at the Ministry of Higher Education and Scientific Research
...Show More Authors

            This research aims to know the role and impact of participation in the capabilities of human resources programs, and for the purpose of measuring it has been determined the dimensions of these two variables by relying on standards for this purpose, was chosen as the Ministry of Higher Education and Scientific Research / device supervision and scientific calendar as one of the important departments in the ministry and includes a large number of individuals at different organizational levels for the purpose of answering a questionnaire prepared for the purpose of measurement and access to the results and the achievement of the objectives of the research and which ha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
The Effect of Different Types of Separating Medium On Some Physical Properties of Processing Acrylic Denture-base with Two Investment Materials: A comparative Study
...Show More Authors

Objective(s): In the present study, glycerin is used as a substitute for tin-foil and cold mold seal (Alginate mould seal)
in the process of curing heat and cold-cure acrylic resin denture base against stone and plaster.
Methodology: 60 specimens were prepared from heat-cure acrylic resin and cold-cure acrylic resin denture base. The
study includes 12 groups of specimens depending on the type of processing, investment material and type of
separating medium that are used in curing process. Each group of them contains 5 specimens for each test.
Some of physical properties of the processed acrylic denture base that (water sorption and solubility) have been
compared with those processed using tin-foil and tin-foil substitut

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Mon May 21 2007
Journal Name
Journal Of Planner And Development
Towards a decentralized planning policy in Iraq
...Show More Authors

Iraq is changing from the centralized system of governance to the decentralized system, which assumes devolution of more authorities to the local governments of Iraqi provinces and cities. This puts a responsibility on the academics to produce more research work on the best framework for this change, to ensure the best results. The main objective of this research is to suggest a policy for the decentralized transformation in domain of Urban and Regional Planning in Iraq. A suggested program for the transformation is involved in the paper as well, with analysis for the new relationships between different levels of planning authorities depending on democracy. In addition, a description for planning process flows from bottom to top.

View Publication Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Surgical Case Reports
A rare variant of mirror hand deformity
...Show More Authors

Congenital hand and forearm anomalies pose a unique challenge in plastic and pediatric surgery. We present a case report of an 8- months-old girl with a congenital left sided hand and forearm anomaly, provisionally diagnosed as atypical left mirror hand anomaly. Classically there is absence of radius and duplication of ulna; however, our case had normal radius and ulna and a hand with seven digits arranged in two groups. We did a surgery which involved a ray amputation of the finger ulnar to the most radial digit, aiming to preserve an adequate first web space to reconstruct the thumb. The result of the surgical treatment in both functional and cosmetic aspects was, in authors’ opinion, good.

Publication Date
Wed Sep 22 2021
Journal Name
Samarra Journal Of Pure And Applied Science
Toward Constructing a Balanced Intrusion Detection Dataset
...Show More Authors

Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Sat Dec 03 2022
Journal Name
Tikrit Journal Of Pure Science
A Pixel Based Method for Image Compression
...Show More Authors

The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of The College Of Basic Education
A study effect Histological changes in Kidney
...Show More Authors

Publication Date
Wed Dec 15 2021
Journal Name
Arab World English Journal
Aggressive Language in Literature: A Pragmatic Approach
...Show More Authors

Aggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref