Recently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visualized and analyzed according to the theory of Complex Networks by representing the stations as nodes and the transmission lines as edges. This analysis is done by applying network metrics to the proposed national IPG network. Finally, this work provides a professional visualization of the generated network based on the demographic distribution and the accurate coordinates of the power stations. Thus, this proposed network is useful for the Iraqi Ministry of Electricity. Besides, it can be adopted by officials and specialists to understand, visualize and evaluate the performance of the current IPG network since it is still under development and modernization.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreIn the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreThis research has presented a solution to the problem faced by alloys: the corrosion problem, by reducing corrosion and enhancing protection by using an inhibitor (Schiff base). The inhibitor (Schiff base) was synthesized by reacting of the substrates materials (4-dimethylaminobenzaldehyde and 4-aminoantipyrine). It was diagnosed by infrared technology IR, where the IR spectrum and through the visible beams proved that the Schiff base was well formed and with high purity. The corrosion behavior of carbon steel and stainless steel in a saline medium (artificial seawater 3.5%NaCl) before and after using the inhibitor at four temperatures: 20, 30, 40, and 50 C° was studied by using three electrodes potentiostat. The corrosion behavior was
... Show MoreIn this work, the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreGingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft
... Show MoreIn this paper, we proved coincidence points theorems for two pairs mappings which are defined on nonempty subset in metric spaces by using condition (1.1). As application, we established a unique common fixed points theorems for these mappings by using the concept weakly compatible (R-weakly commuting) between these mappings.
In this paper we report the use of supersonic jet laser induced fluorescence (LIF) spectroscopy to facilitate the study of the spectra of some organometallic sandwich compounds particularly the metallocenes. The charge-transfer processes within these compounds, especially ligand to metal charge transfer within decamethylrhenocene ( - C5 Me5)2 Re were of particular interest. The spectrum shows a high degree of structures, indicating that there are several levels populated and these molecules are able to undergo many possible transitions
Abstract Objectives: The study aims to evaluate the nurses' practices that concerning intravenous chemotherapy infusion and to find out the association between nurses' practices and their level of education, year of experiences, and training course.
Methodology: A descriptive study was conducted in Baghdad Teaching Hospital and Al Amal National Hospital for Treatment of Tumors for the purpose of evaluating the practices of nurses related to infusion of intravenous chemotherapy for the period from 20th October 2017 to 14th March 2018. The sample was randomly selected from both hospitals. Who were evaluated by using a checklist to observe their practices which consisted of two parts; the first part included the demographic information
Objective: To evaluate the client's satisfaction about the services provided in primary health care centers in the
city of Baghdad and its impact on the improvement of services.
Methodology: A simple random sample consisting of (200) clients to primary health care centers in the city of
Baghdad, (15-20) clients for each center using a questionnaire to evaluate the client's satisfaction for the service
and the use of the direct method of interview, which lasts for (6-10) minutes.
Results: Results of the study show that the number of men visits to primary health care centers, fewer women
This indicates that the most important responsibilities of family members and private health care is the
responsibility of women than