Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis study tries to clear the correlation and association between asthma, obesity and leptin levels. Also it will work to indicate the main risk factors which play role in the elevation of leptin level within asthmatic patients. This is a case control study conducted on (38) asthmatic patients and (20) healthy control who were closely similar by age, gender and BMI. The main statistical tests used were student t test, linear regression test and correlation test. Significance was set at P < 0.05. Sampling method used for this study was convenience sampling method. The main results of this study show a significant association and positive correlation between age (old age ≥ 40 ye
... Show MoreThe study aimed to reveal the possibility of predicting academic procrastination through both Cognitive distortions and time management among students of Al-Aqsa Community College, as well as to reveal the level of both cognitive distortions, time management, and academic procrastination. Additionally, it aimed to identify the size of the correlation between cognitive distortions, time management, and academic procrastination. The study sample consisted of (250) students from Al-Aqsa community college students. The results of the study concluded that the mean for each level of cognitive distortions and academic procrastination is average. The mean level of time management is high. There is a statistically significant positive relationshi
... Show More
The present work is qualitative descriptive. It aims to examine the idiosyncratic schema when deciphering the selected violence-based panel from Nasser Ibrahim’s caricatures. The researchers accordingly adopted part of Sharifian’s (2011) Cultural Schema model, particularly that part that is concerned with the examining the micro/idiosyncratic level of understanding. The study has revealed that the participants have not only differed among themselves regarding the way a figure is being denotatively conceptualized, they also highlighted different exact conceptualizations for the same figure, such as: using various adjectives that reflect various levels of intensity, emphasizing the behavioral aspect or the appearance of the figure, ado
... Show MoreThe purpose of this research is to identify the effect of the use of project-based learning in the development of intensive reading skills at middle school students. The experimental design was chosen from one group to suit the nature of the research and its objectives. The research group consisted of 35 students. For the purpose of the research, the following materials and tools were prepared: (List of intensive reading skills, intensive reading skills test, teacher's guide, student book). The results of the study showed that there were statistically significant differences at (0.05) in favor of the post-test performance of intensive reading skills. The statistical analysis also showed that the project-based learning approach has a high
... Show MoreTo assess the biochemical, mechanical and structural characteristics of retained dentin after applying three novel bromelain‑contained chemomechanical caries removal (CMCR) formulations in comparison to the conventional excavation methods (hand and rotary) and a commercial papain‑contained gel (Brix 3000). Seventy‑two extracted permanent molars with natural occlusal carious lesions (score > 4 following the International Caries Detection and Assessment System (ICDAS‑II)) were randomly allocated into six groups (n = 12) according to the excavation methods: hand excavation, rotary excavation, Brix 3000, bromelain‑contained gel (F1), bromelain‑chloramine‑T (F2), and bromelain chlorhexidine gel (F3). The superficial and deepe
... Show MoreThis paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and t
... Show MoreThe objective of this work is to study the influence of end milling cutting process parameters, tool material and geometry on multi-response outputs for 4032 Al-alloy. This can be done by proposing an approach that combines Taguchi method with grey relational analysis. Three cutting parameters have been selected (spindle speed, feed rate and cut depth) with three levels for each parameter. Three tools with different materials and geometry have been also used to design the experimental tests and runs based on matrix L9. The end milling process with several output characteristics is solved using a grey relational analysis. The results of analysis of variance (ANOVA) showed that the major influencing parameters on multi-objective response w
... Show More