Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThis research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with economic concentration. &n
... Show MoreThe research aims at identifying the level of family violence directed against the kindergarten child, as well as to identify the significance of the difference in family violence directed against the kindergarten child according to the gender variable
(male-female). It aims also to identify the significance of the difference in family violence directed against the kindergarten child according to the Stage variable (kindergarten-pre-primary). The researcher employed the descriptive correlative approach to conduct the study. The research sample was chosen in a simple random way, as the number of the participants was (130) boys and girls, with (70) males and (60) females, distributed according to the stage with (66) participants in
... Show More
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreLocal food samples investigated for the presence of pathogenic bacteria. Hash meat sample was used to isolate Escherichia coli and chicken meat (poultry) was used to isolate Salmonella typhi. Biochemical tests and API20E system used in order to identify these isolates. Two natural vinegar samples (dates & apple cider) were used in order to study its antibacterial activity against the two tested bacteria. Disc diffusion method was used, the results showed that two vinegar samples have antibacterial activity against the two tested bacteria. Date vinegar showed inhibition zone 19mm against E. coli & 9mm against S. typhi, while Apple cider vinegar showed diameter of inhibi
... Show MoreThe changes that happen in training progress especially in skill side demands tests researchers found poorness for patterns to special tests in defending skills against shooting although applying these tests on other samples without considering the age , so the problem of research came controlling the tests of defense against shooting that serve juniors players and match the original society to serve the basketball game . The research sample chosen for juniors players for Baghdad clubs in season (2011-2012) the sample numbered (82) players represented (7) clubs that their percentage (82%) , after gaining the data processed statically and we reached to conclusion that : defending tests against shooting applied first time in Iraq in Iraq envi
... Show MoreThe problem of the research came through the following question (what is the effectiveness of active design in contemporary industrial products), and it emphasized the importance of research to make society with its members in a positive state of activity, and what can help the industrial product design to achieve this, but the goal of the study is (determining the characteristics and principles of design Active and its effectiveness in the industrial product), and the study was determined by industrial products related to daily, recreational and sports activity, The researcher relied on a form to determine the axes of analysis for the sample models, in order to reach the results of the research, the most important of which are: Realiz
... Show MoreIt is certain that marriage has the favor of the continuity of human kind since the Prophet Adam till now. But this important event is threatened by some justifications which lead to its delay or abandonment. In the West, sexual relations, illegal friendships, and disrespect of marriage sacredness lead to this delay. While the reasons behind the delay of marriage in the Arab world refer to high dowries, women go out to work, and the religious and scientific ignorance of the need and importance of marriage. The problem also differs according to the difference between the rural and urban regions. On one hand, we find that early marriage is a necessity in the rural regions; on the other hand, the delay of marriage is a clear and nat
... Show More