The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe design of this paper is to find the possible correlation of Epstein Barr virus infection ina group of Iraqi women with cervical carcinoma though detection of Latent Membrane Protein 1 (LMP1) in these cervical tissues. Paraffinized blocks of two groups were included. The first sample of 30 cervical carcinomatous tissues and 15 biopsies from an apparently normal cervical tissues. All the samples were sectioned on a positive charged slides with 4 mm – thickness then submitted for immunohistochemical (IHC) staining to detect viral LMP1 expression. Sixty three percentage (19 out of 30) of the studies group showed positive overexpression as shown in with a significant association of the expression with cervical cancer with a significant ass
... Show MoreThis study investigated the application of the crystallization process for oilfield produced water from the East Baghdad oilfield affiliated to the Midland Oil Company (Iraq). Zero liquid discharge system (ZLD) consists of several parts such as oil skimming, coagulation/flocculation, forward osmosis, and crystallization, the crystallization process is a final part of a zero liquid discharge system. The laboratory-scale simple evaporation system was used to evaluate the performance of the crystallization process. In this work, sodium chloride solution and East Baghdad oilfield produced water were used as a feed solution with a concentration of 177 and 220 g/l. The impact of temperature (70, 80, and 90 °C), mixing speed (300, 400, and 500 rp
... Show MoreThis study investigated the application of the crystallization process for oilfield produced water from the East Baghdad oilfield affiliated to the Midland Oil Company (Iraq). Zero liquid discharge system (ZLD) consists of several parts such as oil skimming, coagulation/flocculation, forward osmosis, and crystallization, the crystallization process is a final part of a zero liquid discharge system. The laboratory-scale simple evaporation system was used to evaluate the performance of the crystallization process. In this work, sodium chloride solution and East Baghdad oilfield produced water were used as a feed solution with a concentration of 177 and 220 g/l. The impact of temperature (70, 80, and 90 °C), mixing speed (300, 400, and 500
... Show MoreThe researcher focused on the importance of the physical abilities of the tennis game, as this game is one of the games that are characterized by its specificity in performance as this game is characterized by continuous movement and dealing with different elements, so this game requires the development of muscle strength, which plays an important role in Performance skills in the game of tennis. There are several methods to develop strength, including flat hierarchical technique, which is one of the most common forms of training in the development of muscle strength. As for the research problem, the researcher found a method that has an effect on the development of force. Therefore, the researcher tried to diversify a
... Show MoreThe researcher focused on the importance of the physical abilities of the tennis game, as this game is one of the games that are characterized by its specificity in performance as this game is characterized by continuous movement and dealing with different elements, so this game requires the development of muscle strength, which plays an important role in Performance skills in the game of tennis. There are several methods to develop strength, including flat hierarchical technique, which is one of the most common forms of training in the development of muscle strength. As for the research problem, the researcher found a method that has an effect on the development of force. Therefore, the researcher tried to diversify a
... Show More