Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
In this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
The urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreThe objective of this research is to study the effect of human capital dimensions (knowledge, skills, abilities, value) and his management dimensions (leadership practices, employess engagement, access knowledge, workforce optimization, learning capacity) with the Office of the Inspector General's staff - the Iraqi Ministry of Culture, has depended questionnaire as a tool in data and information related to research collection, as distributed to a sample of (63) individuals were distributed in positions (director, director of the Division of employees) the search data analysis using ready-statistical program (spss) the researcher used hypothesis testing and correlation c
... Show MoreThe present work has been characterized by higher order modes in the cavities of the Gyrotron; they are capable of producing RF plasma by developments of it. It uses for fusion systems. We choose the TE31,8 mode in our study. The main problem of gyrotron is the device of the thermal cavity loading. The problem of the thermal loading is solved when any parasitic modes suppress, absence of desired modes; the thermal loading is increased when the high power tube of gyrotron operation is unstable. The mathematical interaction model contains equations that describe the electron motion and the field profiles of the transferred electric modes of the resonator, these are interacting with electrons based
... Show Moreملخص البحث
تبحث الدراسھ عن تنفیذ افضل لمفھوم التعلم مدى الحیاة كھیكل موجھ للسیاسة التربویة في العراق بشكل عام وفي
التعلیم العالي بشكل خاص. تحدد الدراسة استراتجیات التعلم مدى الحیاة وتناقش اھمیتھ وسماتھ الرئیسیة لتسھیل
الوصول الى فرص تعلم متمیز و ملائم لحاجات الطلبة مدى الحیاة، كما تناقش دور الجامعة في تحقیق ھذا الھدف.
This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode
... Show MoreIn this research various of 2,5-disubstituted 1,3,4-oxadiazole (Schiff base, oxo-thiazolidine , and other compounds) were synthesized from 2,5-di(4,4?- amino-1,3,4-oxadiazole ) which use quently synthesized from mixture of 4-amino benzoic acid and hydrazine in the presence of polyphosphorus acid. The synthesized compounds were characterized by using some Spectral data (UV, FT-IR, and 1H-NMR).
In this paper, the researcher suggested using the Genetic algorithm method to estimate the parameters of the Wiener degradation process, where it is based on the Wiener process in order to estimate the reliability of high-efficiency products, due to the difficulty of estimating the reliability of them using traditional techniques that depend only on the failure times of products. Monte Carlo simulation has been applied for the purpose of proving the efficiency of the proposed method in estimating parameters; it was compared with the method of the maximum likelihood estimation. The results were that the Genetic algorithm method is the best based on the AMSE comparison criterion, then the reliab
... Show MoreIn this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.