This study aims to analyze the flow migration of individuals between Iraqi governorates using real anonymized data from Korek Telecom company in Iraq. The purpose of this analysis is to understand the connection structure and the attractiveness of these governorates through examining the flow migration and population densities. Hence, they are classified based on the human migration at a particular period. The mobile phone data of type Call Detailed Records (CDRs) have been observed, which fall in a 6-month period during COVID-19 in the year 2020-2021. So, according to the CDRs nature, the well-known spatiotemporal algorithms: the radiation model and the gravity model were applied to analyze these data, and they are turned out to be complementary to each other. However, the results explore the flows of each governorate at two levels of abstraction: The Macroscopic and Mesoscopic. These results found that the spatiotemporal interaction models are complementary to the other, as the determined flows based on the radiation model have been used in the gravitational model. Furthermore, flows summary among all the governorates as well as for each of them has been obtained separately. Thus, based on the total number of flows, the highest attraction rate was between Nineveh and Dhi Qar governorates which reached , while the lowest attraction was between Wasit and Karbala governorates which reached . In addition, the extracted geographical maps showed each governorate ratio. Regarding the color of each governorate that degraded from light to dark, which indicated the low to high attraction respectively. In the future, it is possible to obtain more detailed data, and to use complex network algorithms for analyzing this data.
The present study aims at investigating classroom verbal and nonverbal communication at the departments of English language . An observation checklist has been constructed , which is distributed into several domains that include a number of items to investigate classroom communication . Face validity and reliability coefficient have been computed. The checklist has been applied on 86 instructors at the Colleges of Education and Arts, Departments of English Language at the Universities of ThiQar, Basrah ,and Maysan . One sample t- test and Two independent sample t-test formulas have been used. Final results reveal that college instructors use verbal communication inside their classrooms and non- verbal communication has not been employed by
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreMobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Harold Pinter’s The Caretaker(1959) clearly portrays a lack of communication among the characters of the play which refers to the condition of modern man. This failure of communication led Harold Pinter to use a lot of pauses and silences in all the plays he wrote instead of words. Samuel Beckett preceded Pinter in doing so in his plays and one way to express the bewilderment of modern man during the 20th century is through the use of no language in the dramatic works. Language is no more important to modern man; instead, he uses silence to express his feelings. Silence is more powerful than the words themselves. That’s why long and short pauses can be seen throughout all Pinter’s plays.
In this play, th
... Show More