This study came to discuss the subject of industries dependent on petrochemical industries in Iraq (plastic as a model) during the period 2005–2020, and the study concluded that the plastic industries contribute to areas of advancement and progress and opportunities to deal efficiently with the challenges posed by the new variables, the most important of which is the information revolution. communications and trade liberalization, and this is what contributes to the competitiveness of these industries. And because the petrochemical industry in Iraq has an active role in establishing plastic industrial clusters and clusters of micro, small, and medium industries by providing the necessary feedstock for these industries in various fields
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreResearchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped
Dam operation and management have become more complex recently because of the need for considering hydraulic structure sustainability and environmental protect on. An Earthfill dam that includes a powerhouse system is considered as a significant multipurpose hydraulic structure. Understanding the effects of running hydropower plant turbines on the dam body is one of the major safety concerns for earthfill dams. In this research, dynamic analysis of earthfill dam, integrated with a hydropower plant system containing six vertical Kaplan turbines (i.e., Haditha dam), is investigated. In the first stage of the study, ANSYS-CFX was used to represent one vertical Kaplan turbine unit by designing a three-dimensional (3-D) finite element (F
... Show More: The Aluminium (Al) material emerged as a plasmonic material in the wavelength ranges from the ultraviolet to the visible bands in different on-chip plasmonic applications. In this paper, we demonstrate the effect of using Al on the electromagnetic (EM) field distribution of a compact hybrid plasmonic waveguide (HPW) acting as a polarization rotator. We compare the performance of Al with other familiar metals that are widely used as plasmonic materials, which are Silver (Ag) and Gold (Au). Furthermore, we study the effect of reducing the geometrical dimensions of the used materials on the EM field distributions inside the HPW and, consequently, on the efficiency of the polarization rotation. We perform the study based o
... Show MoreBackground: Odontogenic tumors are a diverse group of lesions with a variety of clinical behavior and histopathologic subtypes, from hamartomatous and benign to malignant. The study aimed to examine the clinical and pathological features of odontogenic tumors in Baghdad over the last 11 years (2011–2021). Materials and Methods: The present retrospective study analyzed all formalin-fixed, paraffin-embedded tissue blocks of patients diagnosed with an odontogenic tumor that were retrieved from archives at a teaching hospital/College of Dentistry in Baghdad University, Iraq, between 2011 and 2021. The diagnosis of each case was confirmed by examining the hematoxylin and eosin stained sections by two expert pathologists. Data from pati
... Show MoreThe technology in continuous and quick development, that reflects in all parts of our life and interred both scientific and practical fields. Marketing is one of them, a customer’s way to deal with choosing and demanding the product deferent from the traditional way. Some of the buying processes are electronic now, therefore the current research is identifying the digital channels that entered the world of marketing and influenced the activities and types that fall under this name and how it affects in positioning strategy, which is how to install the product or brand in the mind of the customer and was dimensions (brand identity, brand personality, brand communication, brand awareness, brand image), The researcher took t
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreA new distribution, the Epsilon Skew Gamma (ESΓ ) distribution, which was first introduced by Abdulah [1], is used on a near Gamma data. We first redefine the ESΓ distribution, its properties, and characteristics, and then we estimate its parameters using the maximum likelihood and moment estimators. We finally use these estimators to fit the data with the ESΓ distribution