Preferred Language
Articles
/
dxbivYoBVTCNdQwC26SA
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sat Dec 30 2023
Journal Name
Al-kindy College Medical Journal
Health System in Iraq Post 2003 War
...Show More Authors

Background: War represents a major human crisis; it destroys communities and results in ingrained consequences for public health and well-being

Objective: We set this study to shed light on the public health status in Iraq after the successive wars, sanctions, sectarian conflicts, and terrorism, in light of certain health indicators.

Design: The primary source of data for this analysis comes from the Iraqi Ministry of Health, and The World Health Organization disease surveillance.

Results: Most of the morbidity indicators are high, even those that are relatively declining recently, are still higher than those repor

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (11)
Scopus Crossref
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Resonance Tunneling Through GaN/AlGaN Superlattice System
...Show More Authors

The purpose of our work is to report a theoretical study of electrons tunneling through semiconductor superlattice (SSL). The (SSL) that we have considered is (GaN/AlGaN) system within the energy range of ε < Vo, ε = Vo and ε > Vo, where Vo is the potential barrier height. The transmission coefficient (TN) was determined using the transfer matrix method. The resonant energies are obtained from the T (E) relation. From such system, we obtained two allowed quasi-levels energy bands for ε < VO and one band for ε  VO.

View Publication Preview PDF
Publication Date
Sat Jun 30 2018
Journal Name
Proceedings Of The International Conference On Intelligent Science And Technology
The nature of intelligent system in buildings
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jul 25 2016
Journal Name
Earthquakes And Structures
Vibration response of saturated sand - foundation system
...Show More Authors

In this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. A physical model was manufactured to simulate steady state harmonic load applied on a footing resting on sandy soil at different operating frequencies. Total of (84) physical models were performed. The parameters that were taken into consideration include loading frequency, size of footing and different soil conditions. The footing parameters are related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were used. The footings were tested by changing all parameters at the surface and at 50 mm depth below model surface. Meanwhile, the investigated paramete

... Show More
View Publication
Publication Date
Thu Jan 01 2009
Journal Name
Iraqi Journal Of Physics
Resonance Tunneling Through GaN/AlGaN Superlattice System
...Show More Authors

The purpose of our work is to report a theoretical study of electrons tunneling through semiconductor superlattice (SSL). The (SSL) that we have considered is (GaN/AlGaN) system within the energy range of ε < Vo, ε = Vo and ε > Vo, where Vo is the potential barrier height. The transmission coefficient (TN) was determined using the transfer matrix method. The resonant energies are obtained from the T (E) relation. From such system, we obtained two allowed quasi-levels energy bands for ε < VO and one band for ε  VO.

View Publication Preview PDF
Publication Date
Wed Feb 09 2011
Journal Name
Journal Of Engineering
Low cost automatic sun path tracking system
...Show More Authors

Solar tracking systems used are to increase the efficiency of the solar cells have attracted the attention of researchers recently due to the fact that the attention has been directed to the renewable energy sources. Solar tracking systems are of two types, Maximum Power Point Tracking (MPPT) and sun path tracking. Both types are studied briefly in this paper and a simple low cost sun path tracking system is designed using simple commercially available component. Measurements have been made for comparison between fixed and tracking system. The results have shown that the trackin

Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Sat Aug 09 2025
Journal Name
Journal Of The Iraqi University
The legal system of Administrative BOT Contracts
...Show More Authors

View Publication
Publication Date
Sun Dec 12 2021
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation
The Development of the US Federal System
...Show More Authors

Geographical, economic, historical, environmental and security factors play a role in strengthening the drive towards union, as well as addressing the need to express regional and federal identity. This is a clear example of this tendency. One legal or one political system with the parts of this united personality retaining their privacy and identity, and there is a delegation to the central entity of the union with some of the common powers while retaining some powers for these parts or states, which means the availability of autonomy for the constituent states of the union and this is the most important characteristic of the federal states or federations It is the autonomy of each state or country participating in the union. Accordingly,

... Show More
Preview PDF