Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreBackground: The PMMA polymer denture base materials are low in thermal and strength properties. The aim of the study was to investigate the change in glass transition temperature, E-Moudulus and coefficient of thermal expansion of acrylic denture base material by addition of Al2O3, TiO2 and SiO2nano-fillers in 5% by weight. Materials and methods: The type of polymerization is free radical bulk polymerization. one hundred twenty (120) specimens were prepared , the specimens were divided into four groups according to the material had been added (one control and three for Al2O3, TiO2 and SiO2nanocomposite) each group was subdivided in to three groups according to the test had been done on it, the degree of transition (Tg) was measured by The d
... Show MoreThe present paper sheds light on the psychological structure of Simha Bin Zion’s A Broken Soul. After reviewing the biography of the storyteller, it is clear that the hero of the rebellious character in the story of (A Broken Soul) is the writer himself. The storyteller directly begins to depict his psychological sufferings in his childhood days. He tells a story full of sadness and refusal of the neglect he suffered in his childhood. It is obvious that the early five years of Samha bin Zion’s life is considered a period of conflict that participated in the formation of his individual identity. The story represents an outlet for a hidden secret world buried under the layers of his consciousness. It deals with
... Show MoreThe radial wave functions of the generalise dWoods–Saxon (GWS) potential within the two-body model of (Core + n) have been used to study the ground-state density distributions of protons, neutrons and matter and the associated root mean square (rms) radii of neutron-rich 14B, 22N, 23O and 24F halo nuclei. The calculated results show that the radial wave functions of the generalised Woods–Saxon potential within the two-body model succeed in reproducing neutron halo in these exotic nuclei. Elastic electron scattering form factors for these nuclei are studied by combining the charge density distributions with the plane-wave Born approximation (PWBA).
Medicinal plants are used to treat various diseases although little is known about their toxicity. Coriandrum sativum is one of the most commonly plants that is used to treat several physiological disorders. Thus, this study was conducted to evaluate the effect of aqueous extract of C. sativum on the structure and function of liver in male albino mice. Thirty male mice were randomly divided into three groups: Group 1 untreated (control), Group 2 and 3 were administrated orally with the aqueous extract of the plant at dose 125 and 250 mg/kg. b. w. For 30 days. The effect of the extract on liver weights, biochemical parameters as well as histological study were assessed. There were no significant difference (P>0.05) observed in relative organ
... Show More