Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe main objective of this work was to adopt an environmentally friendly technology with enhanced results. The technology of magnetic water (MW) treatment system can be used in concrete mixture production instead of potable water (PW) to improve both workability and strength. Two types of concrete were adopted: normal concreter production with two grades 25 and 35 MPa and the self-compacted concrete (SCC) with 35 MPa grade. The concrete mixes containing MW instead of PW results showed that, for 25 MPa grade, an improvement in a compressive strength of 15.1, 14.8, and 10.2% was achieved for 7, 28, and 90 days, respectively. For 35 MPa grade, an improvement of 13.6, 11.5, and
Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show MoreInfrastructure, especially wastewater projects, plays an important role in the life of residential communities. Due to the increasing population growth, there is also a significant increase in residential and commercial facilities. This research aims to develop two models for predicting the cost and time of wastewater projects according to independent variables affecting them. These variables have been determined through a questionnaire distributed to 20 projects under construction in Al-Kut City/ Wasit Governorate/Iraq. The researcher used artificial neural network technology to develop the models. The results showed that the coefficient of correlation R between actual and predicted values were 99.4% and 99 %, MAPE was
... Show MoreThe accumulation of toxic elements in vegetables and melons grown in agriculture, Brassica rapa - turnip, Solanum lycopersicum - tomato, Citrullus lanatus - watermelon, Capsicum annuum - bell pepper, Daucus carota - carrots, Cucurbita pepo - pumpkin, Cucumis melo - melon, and also Prunus armeniaca - apricot from fruit trees were analyzed. The excess of maximum allowable concentrations in agricultural crops of the element As by 1.65-1.75, Cd - 1.6-2.3, Cr -1.2-2.35, Cu -1.6-3.3, Ni - 1.16-3.53, Pb - 1.54-3.08, Al - 1.36-3.5, Sb - 2.0-33, Se - 1.1-3.3 times was established. The maximum allowable concentration of mercury in vegetables and melons was equal to 0.02 mg/kg,
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreThe plant Borago officinalis, which belongs to the Boraginaceae family and Celebrated as borage, is one of the useful medicinal plants cultivated in Iraq. It was used in olde medicine in Iraq, Irane, Syria and Europe for management of various diseases. It is commonly used as an atonic, tranquilliser, management of cough, sore throat, pneumonia, swelling, inflammatory diseases, antioxidant, and anticancer. This project provides the first comprehensive research done in Iraq to study the phytochemicals and the methods of extraction and isolation of active constituents from Borago officinalis cultivated in Iraq. The plant was harvested in spring from AL-Rifai, Nassiriyah city, IRAQ in February 2019.were w
... Show MoreIn this study, three strengthening techniques, near-surface mounted NSM-CRFP, NSM-CFRP with externally bonding EB-CFRP, and hybrid CFRP with circularization were studied to increase the seismic performance of existing RC slender columns under lateral loads. Experimentally, 1:3 scale RC models were studied and subjected to both lateral static load and seismic excitation. In the dynamic test, a model was subjected to El Centro 1940 NS earthquake excitation by using a shaking table. According to the test results, the strengthening techniques showed a significant increase in load carrying capacity, of about 86.6%, and 46.6%, for circularization and NSM-CFRP respectively, of the reference unstrengthened columns. On the other hand, column
... Show More