Ahmed ibn Imad ibn Yusuf al-Aqfhasi (808 AH / 1405 AD) is a small message that speaks about the Nile River in all its sides, despite its limited papers, but it is one of the manuscripts of the important geographical literature for its geographical, historical, religious and grammatical information. it was not limited to the information of the author alore, but taken from many sources below, which added to the importance of the fact that it has saved us the names of the sources that preceded him in mentioning this river with the names of its authors.The method of the Aqfhasi was characterized by scientific methodology in writing and clarity, with reference to some of the myths that people carried in their minds about the Nile River at that time.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreThe physical sports sector in Iraq suffers from the problem of achieving sports achievements in individual and team games in various Asian and international competitions, for many reasons, including the lack of exploitation of modern, accurate and flexible technologies and means, especially in the field of information technology, especially the technology of artificial neural networks. The main goal of this study is to build an intelligent mathematical model to predict sport achievement in pole vaulting for men, the methodology of the research included the use of five variables as inputs to the neural network, which are Avarage of Speed (m/sec in Before distance 05 meters latest and Distance 05 meters latest, The maximum speed achieved in t
... Show MoreObjective: Assessment of health problems and identify demographical information to elderly. Methodology:
it is a descriptive study, data were collected by the researchers depended on the direct interview with the
elderly by using the study instrument (questionnaire) as well as review the records of the geriatric.
Results: The majority of study sample (66%) were males and (24.3%) were within age group (70-74) years,
(44.7%) were widows, and (41.7%) did not read and write. This study applied the international classification
of diseases(short-table) in (11) items, which stated that most of the elderly were complaining from
health problems: debility of hearing (80.65%), eczema or allergies (69.35%), debility of vision (66.9