Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
A chemical study was carried out to evaluate the efficiency of the liver enzyme concertation and uric acid level and its antagonists in the serum of the professors exposed to chemicals in the laboratories of the University of Samarra and their comparison with the healthy people. The research included 25 samples of the exposed professors and 20 samples as a group of officers.
The results of the current study showed a significant increase in the level of AST, ALT in the serum of professors exposed to chemicals compared to healthy people. The results showed no significant increase in
... Show MoreIt is the dynamic tension between the relatively fixed built environment and the constantly changing in social life that determines the nature of urban spaces belonging to different historical periods, and considered as a tool for diagnosing transformations in urban spaces, that’s why, the characteristics of urban space became unclear between positive spaces and negative spaces, so emerged the need to study contemporary urban space belonging to the current period of time and show the most important transformations that have occurred in contemporary urban space to reach urban spaces that meet the current life requirements. Therefore, the research dealt with a study of the characteristics of contemporary urban space and the most pr
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThroughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.
An integrated GIS-VBA (Geographical Information System – Visual Basic for Application), model is developed for selecting an optimum water harvesting dam location among an available locations in a watershed. The proposed model allows quick and precise estimation of an adopted weighted objective function for each selected location. In addition to that for each location, a different dam height is used as a nominee for optimum selection. The VBA model includes an optimization model with a weighted objective function that includes beneficiary items (positive) , such as the available storage , the dam height allowed by the site as an indicator for the potential of hydroelectric power generation , the rainfall rate as a source of water . In a
... Show MoreObjective(s): To assess the types of violence among adolescents in Baghdad City.
A descripƟve study which was using the assessment approach was conducted on purposive sample of 60 parents of
adolescent for identify types of adolescents violence in their families, was selected according to specific criteria for
participating in health education program towards adolescents' violence control in Baghdad city.
Methodology: A questionnaire was constructed for the purpose of the study. It was consisted of two parts; the first
part which included the parents' demographic characteristics for parents (sex, age, educational level and socioeconomic
status); the second part included types of adolescent violence that reported by par
The present work is concerned with the finding of the optimum conditions for biochemical wastewater treatment for a local tannery. The water samples were taken from outline areas (the wastewater of the chrome and vegetable tannery) in equal volumes and subjected to sedimentation, biological treatment, and chemical and natural sedimentation treatment.
The Box-Wilson method of experimental design was adopted to find useful relationships between three operating variables that affect the treatment processes (temperature, aeration period and phosphate concentration) on the Biochemical Oxygen Demand (BOD5).
The experimental data collected by this method were successfully fitted to a second order polynomial mathematical model. The most fa