Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreSince the beginning of the second decade of the twenty-first century, Saudi Arabia tried to pursue an open foreign policy towards many countries in the Horn of Africa, especially with Ethiopia and Somalia, due to the geostrategic qualities that these two countries possess.Despite the development of Saudi foreign policy towards Ethiopia and Somalia, it was soon affected by the tension after the events that the Gulf states went through, that is, the Qatari crisis with Saudi Arabia,especially after most of the countries of the Horn of Africa adhered to a policy of neutrality towards the Gulf-Gulf crisis.
Thus it is expected that despite the geographical proximity and the historical, economic and political relations between Saudi Ara
... Show MoreThe study addresses the problem of stagnation and declining economic growth rates in Arab countries since the eighties till today after the progress made by these countries in the sixties of the last century. The study reviews the e
... Show MoreBackground: Dilated cardiomyopathy (DCM) is a well-recognized cause of cardiovascular morbidity and mortality.Objectives: To evaluate the prognostic implications of the restrictive left ventricular filling pattern (RFP) in dilated cardiomyopathy.Methods: Patients with DCM admitted to Ibn AL-Bitar Hospital for Cardiac Surgery, Baghdad-Iraq, from May 2006 to August 2008, underwent a full clinical evaluation and Doppler echocardiography study. Patients were classified into three groups: Group I had persistent restrictive filling pattern; Group II had reversible restrictive filling pattern; and Group III had nonrestrictive filling pattern. Results: The current study was conducted on a total number of 80 patients with DCM, fifty (62.5 %) were
... Show MoreBackground: Congenital cardiac defects have a wide spectrum of severity in infants. About 30-40% of patients with congenital cardiac defects will be symptomatic in the 1st year of life, while the diagnosis was established in 60% of patients by the 1st month of age.
Objectives: To identify the occurrence of specific types of CHD among hospitalized patients and to evaluate of growth of patients by different congenital heart lesions.
Methods: A retrospective study, done on ninety-six patients (51 male and 45 female) with congenital heart disease (CHD) admitted to central teaching hospital of pediatrics, Baghdad from 1st September 2009 to 30
At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreKE Sharquie, AA Noaimi, EA Al-Janabi…, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 13
Abstract
Robust controller design requires a proper definition of uncertainty bounds. These uncertainty bounds are commonly selected randomly and conservatively for certain stability, without regard for controller performance. This issue becomes critically important for multivariable systems with high nonlinearities, as in Active Magnetic Bearings (AMB) System. Flexibility and advanced learning abilities of intelligent techniques make them appealing for uncertainty estimation. The aim of this paper is to describe the development of robust H2/H∞ controller for AMB based on intelligent estimation of uncertainty bounds using Adaptive Neuro Fuzzy Inference System (ANFIS). Simulatio
... Show MoreIn this research, a variable stiffness actuator is proposed to enhance the damping of the mechanical vibrating system. The frequency response analysis of the vibrating system is dependant in order to analyze and synthesis this semi-active damping, where the suggested process is using active filter to estimate the present frequency of the vibration system, and this will limit the value of the stiffness of the vibrated system. Two active filter s are needed, low-pass-filter (LPF) to choose the higher stiffness of the actuator at small frequencies as well as more damping and high-pass-filter (HPF) to choose the lower stiffness of the actuator at high frequencies as well as more damping, and so
... Show MoreIncreased downscaling of CMOS circuits with respect to feature size and threshold voltage has a result of dramatically increasing in leakage current. So, leakage power reduction is an important design issue for active and standby modes as long as the technology scaling increased. In this paper, a simultaneous active and standby energy optimization methodology is proposed for 22 nm sub-threshold CMOS circuits. In the first phase, we investigate the dual threshold voltage design for active energy per cycle minimization. A slack based genetic algorithm is proposed to find the optimal reverse body bias assignment to set of noncritical paths gates to ensure low active energy per cycle with the maximum allowable frequency at the optimal supply vo
... Show More