Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreIn the light of what is witnessing in the advertising arena of new ways and methods in delivering advertising message to consumers by finding new outlets to communicate with them especially through social networking sites, which became the first choice of advertising companies in order to spread its goods and services. These companies now are relying gradually on celebrities to appear with their products and goods to drive the audience's attention towards them. The thesis aims to find out the attitudes of young people towards the the advertisements that show famous celebrities on social networking sites. The researcher used survey method which aims to record, analyze and interpret the phenomenon after collecting the necessa
... Show MoreDifferent parameters of double pipe helical coil were investigation experimentally. Four coils were used; three with a curvature ratio (0.037, 0.031, and 0.028) and 11mm diameter of the inner tube while the fourth with 0.033 curvature ratio and 13 mm diameter of the inner tube. The hot water flow in the inner tube whereas the cold water flows in the annulus. The inlet temperatures of hot and cold water are 50 0C and 18 0C respectively. The inner mass flow rate ranges from 0.0167 to 0.0583 kg/s. The results show the Nusselt number increase with increase curvature ratio. The Nusselt number of the coil with 0.037 curvature ratio increases by approximately 12.3 % as compare with 0.028 curvature ratio. The results also r
... Show MoreA Destructive Parenthood : The Problematic Motherhood in Selected Poems by Salvia Plath
The present study discusses the names of the Day of Resurrection in Uri Rubin’s translations of the Holy Qur’an. To identify the translation difficulties and complications and to find out the Hebrew equivalence, the study, through the application of a comparative analytical approach, aims at analyzing the linguistic structures of Day of Resurrection names cited in the Holy Qur’an. Heavenly religions are rich with distinct and unique terms that distinguish and reflect their specificity of other religions; something requires a great accuracy in the translation of such terminology. By investigating selected examples of the names of the Day of Resurrection in Arabic and Hebrew, the present study sheds light on the morphological and semant
... Show Moreهدف البحث الحالي التعرف على فاعلية انموذج سكمب المعدل في الأصالة الرياضية واتجاه طلاب الصف السادس العلمي نحو البرهان الرياضي ، تَمَّ الاستعانة بالتصميم التجريبي ذي الاختبار البعدي والضبط الجزئي لمجوعتين متكافئتين (تجريبية وضابطة) ، تكونت عينة البحث من (55) طالباً من طلاب الصف السادس العلمي في ثانوية ابن الهيثم للبنين الواقعة في مركز محافظة القادسية ، جرى توزيع طلاب عينة البحث عشوائياً إلى مجموعتين إحداهما تج
... Show MoreThe study aimed to clarify the meanings learned and inferred from reading books، letters and messages in Surat Al-Qur’an. The inductive method، the analytical method، and the deductive method، One of the most prominent results of the research: that the multiplicity of Qur’anic readings produces a variety and expansion in the meaning that has a clear impact on the interpretation by clarifying the meaning of the verse.
The organizational integration forms a necessity according to McKinsey model, especially for service organizations. In the context of various service sector developments, importance adoption of compact mechanisms by these organizations to upgrade their services has increased and senior management must be more aware of environmental, competitive and developmental requirements. It gets more important when it shows in an organization seeking at excellence of making services within its policies and strategies. Subject organizational integration dimensions (strategy, structure, systems, style, staff, shared values, and skills) are effective components in directing behaviors of employees and organization. This motivated both researcher
... Show More