Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f
... Show More Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built
The traditional method adopted in the preparation of the general budget in Iraq is not consistent with developments in the size specification response and spending and the associated weakness in the size of the amounts earmarked for investment projects which could adversely affect future generations and not to enable them to continue the development, which requires talking to estimate the adoption of style public expenditure in the state budget and reduce waste and extravagant where and invest public revenues of the state in investment projects and preservation of the environment and natural resources in order to ensure the benefit of future generations system, according to the system serves to achieve the overwhelming majority of member
... Show MoreThe research aims to reveal the impact of developmental leadership in its dimensions (ideal model, interest in employees, inspiration and motivation) as an independent variable in achieving adaptive performance in its dimensions (Creative problem solving, learning and motivation, Training efforts, adaptability, work stress management, dealing with crises and emergencies) as a dependent variable, and the research aims to enhance the quality of developmental leadership in the research sample through this leadership style, which is a modern style and is still under research and study with a focus on the benefit of adaptive performance From a psychological and organizational research sample consisting of (106) respondents from the middle adm
... Show MoreBackground: Pit and fissure sealant have been considered an outstanding adjunct to oral health care in the decrease of occlusal caries onset and low progression. The aims of this in vitro study were to evaluate the marginal microleakage of three different types of fissure sealants (SDI, Tg and tetric N-flow) by time interval, one day and 45 days, in the presence or absence of bonding agent among maxillary and mandibular teeth. Materials and methods: Seventy two sound human maxillary and mandibular first premolar teeth were collected which were free from obvious carious lesions. The teeth were randomly divided into two main equal groups, group (1) and group (2), each group consists of (36) teeth involving equal numbers of maxillary and mandi
... Show MoreThe purpose of this work was to study the effects of the Nd:YAG laser on exposed dentinal
tubules of human extracted teeth using a scanning electron microscope (SEM). Eighty 2.5mm-thick
slices were cut at the cementoenamel junction from 20 extracted human teeth with an electric saw. A
diamond bur was used to remove the cementum layer to expose the dentinal tubules. Each slice was
sectioned into four equal quadrants and the specimens were randomly divided into four groups (A to D ).
Groups B to D were lased for 2 mins using an Nd:YAG laser at 6 pulses per second at energy outputs of
80 , 100 and 120 mJ. Group A served as control. Under SEM observation, nonlased specimens showed
numerous exposed dentinal tubules. SEM o
Type 2 diabetes mellitus (T2DM) became the most prevalent health problem. Almost half of the world's people are ignorant that have diabetes. Menopause occurs as an important alteration in women through which take place the change in sex hormones, distribution in fat،s body, and metabolism, altogether which participate in the metabolism disease such as type 2 diabetes mellitus. Several studies have appeared the association between the TCF7L2 gene and different diseases like type 2 diabetes mellitus (T2DM). This study aimed to detect the relation of the genetic variation polymorphism for the TCF7L2 gene (rs12255372 G/T) in Iraqi women menopausal with T2DM. The outcomes indicated the increased levels of biochemical characteristics including H
... Show More