Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicious attacks. In this manuscript, a correspondence model is designed to discuss the algorithm in the environment of wireless communication systems and distributed computing by adopting the protocol data enhancement to the network using structured construction and diversity algorithm to improve the effectiveness of the intrusion detection system. Next, a multi-label convolutional neural network model is used to detect business transactions. An CNN was trained on the WSN-DS dataset using 5-Fold in CV technique with three hidden layers. The highest Precision values 0.951 of Grayhole attack for multi-classification.
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreIt is no secret to anyone that studying and investigating books of jurisprudence, despite their suffering, is a pleasure that cannot be compared to pleasure, and it has benefits and importance that cannot be limited and summed up, and it has great fruits that researchers and students of knowledge reap, as well as enriching libraries with jurisprudential material, after dusting them and taking them out to the light of libraries to be seen. Researchers and scholars, generation after generation, so that this nation can benefit from this pioneering intellectual and scientific product that was written for us by our first ancestors of working scholars who enriched human civilization with this scientific material, which has become a beacon guid
... Show MoreThe study aims at diagnosing the importance of environmental analysis (external, industrial and internal) in the organization's strategy for the development of public organizations. The theoretical problem derived from the existence of a knowledge gap for studies and research that dealt with the variables of the study. Three public organizations were selected as the study society (the Civil Defense Directorate, the Directorate of Nationality, Passports and Residency, the General Traffic Directorate). The sample of the study was a sample of (215) managers (managers, department managers, Analysis of the data and hypothesis testing using the appropriate statistical tools, Pearson, the simple and multiple regression coefficient to te
... Show MoreThis study aimed to manufacture an innovative device that enables the player to walk after the operation and improves the functional efficiency through the improvement in the range of motion as well as the improvement in the size of the muscles working on the knee joint. The research, the study population consisted of players with severing the anterior cruciate ligament of the advanced soccer players, and the number of the research sample was (5) injured for the control sample and (5) for the experimental sample in Abu Ghraib Hospital and some rehabilitation centers for a period of six months, and the pre-tests were conducted after two weeks of The cruciate ligament surgery was performed, and the innovative device was used for the e
... Show MoreOne of the most common procedures in oral surgery is the removal of impacted mandibular third molars, often followed by pain, swelling, alveolitis, and trismus. Purpose. To compare the outcomes of the intrasocket application of 1% hyaluronic acid oral gel (HA) and advanced platelet-rich fibrin (A-PRF) on the expected postoperative complications, pain, swelling, and trismus follow the surgical extraction of the impacted mandibular third molar. Material and Methods. A randomized controlled trial was conducted at the Oral and Maxillofacial Surgery Unit, Dental Teaching Hospital. Healthy patients who required surgical removal of the impacted mandibular third molar were divided randomly into three groups. The extraction site of the group
... Show MoreThe current study aims to investigate the effect of strategic knowledge management practices on an excellent performance at the Institution of Industrial Development and Research- the Ministry of Iraqi Industry (IDRMII). The present research is designed according to the descriptive method. To achieve the mentioned research objective, the researchers used the questionnaire as the main data collection tool. The research sample was 150 managers who are working at the top and middle management levels. To analyses the data gathered and reaching the results, several statistical techniques were used within AMOS.V25, SPSS.V21Software, This study reached a set of results, the most important of which is the existence of a positive correlat
... Show MoreSummary:
This research revolves around the probing of those whom Ibn Hajar said, "He has a vision", its significance, and the ruling on the connection and transmission to it. The number of narrators reached fifty-one (51) narrators, among whom it was said, “He has a vision, whether it is definite or possibly. Some of them had a vision and companionship.”They are eleven (11) narrators, And among them were those who had visions and had no company, and their number was twenty-one (21) narrators, and among them were those who had no vision and nor company, and their number is nineteen (19) narrators.
As a result , whoever said about him “has a vision” and has companions, his hadith is connected, even i
Abstract
Rayleigh distribution is one of the important distributions used for analysis life time data, and has applications in reliability study and physical interpretations. This paper introduces four different methods to estimate the scale parameter, and also estimate reliability function; these methods are Maximum Likelihood, and Bayes and Modified Bayes, and Minimax estimator under squared error loss function, for the scale and reliability function of the generalized Rayleigh distribution are obtained. The comparison is done through simulation procedure, t
... Show MoreThe aim of the research was to prepare a scale of obstacles to achieving quality performance, field application from the point of view of fourth-stage female students, to identifyOn the difficulties and obstacles to achieving quality performance through field application from the students’ point of view for the topic (school administrative procedures, learners, cognitive achievement, school tools).The researchers used the descriptive approach in the research procedures as it is an appropriate approach to achieve the research objectives.,The following questions were asked:There are obstacles and difficulties faced by female students during the process of choosing schools, dealing with school administrations, and the difficulties fa
... Show MoreDeposits with the Industrial Bank, together with loans received from others, are non-financial financial resources, which are sources of supply to the Industrial Bank of funds that allow the Bank to expand the granting of loans. The increases in this resource indicates that the bank is practicing comprehensive banking, which is consistent with the nature of the transformation of the banking system towards multiple businesses. Therefore, the research comes to highlight the causality of the trend between total deposits and total loans. And if the causality is found, is it one-way or two-way? How long is the impact?