With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack
... Show MoreIn this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade
... Show MoreA method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More
The public budget in Iraq depends on a number of legislations across its fourth stages, starting from preparation to implementation and control; one of these legislations is the amended law of financial management and public Debt. No. (95) In 2004. Accordingly, the public budget cycle faces various failures, some of them resulted from the shortcomings in the legislation depended that effect on the public budget in a way or another; whereas the other failure resulted from no applying the legislation that adversely effect on the public budgeting stages that call for studying them and paying the attention toward them to present the suggestions that contribute in handling and developing public budgetin
... Show MoreObjectives: The study aims to evaluate effectiveness of health education program on health care providers’ knowledge toward immunization of children at primary health care centers in Kirkuk city.
Methodology: A quasi –experimental study design two- group (pre-test, post-test 1 and post-test 2) conducted at primary health care centers in Kirkuk city during the period from 28 October 2019 to 10 August 2020. By collecting (50) samples divided into two groups, each one (25) participant as control & study group. The study group exposed to the education program only.
Results: Results showed a clear positive
... Show MoreComputer simulations were carried out to investigate the dependence of the main perturbation parameters (Sun and Moon attractions, solar radiation pressure, atmosphere drag, and geopotential of Earth) on the orbital behavior of satellite. In this simulation, the Cowell method for accelerations technique was adopted, the equation of motion with perturbation was solved by 4th order Runge-Kutta method with step (1/50000) of period to obtain the state vectors for position and velocity. The results of this simulation have been compared with data that available on TLEs (NORD data in two line elements). The results of state vectors for satellites (Cartosat-2B, Gsat-14 an
Background: Most prevalent chronic liver disease in developed and developing nations is non-alcoholic fatty liver disease. From fatty liver, which often has benign, non-progressive clinical history, to non-alcoholic steatohepatitis, a more serious variant of fatty liver that can lead to cirrhosis and end-stage liver disease, non-alcoholic fatty liver disease encompasses broad spectrum of diseases. The gold standard for determining extent of hepatic fibrosis is still liver biopsy; however, number of noninvasive tests have been established to make diagnosis and assess effectiveness of treatment.
Objective: Aim of study was to assess effectiveness of the combination of fibroscan and
... Show MoreThe interest of many companies has become dealing with the tools and methods that reduce the costs as one of the most important factors of successful companies, and became the subject of the attention of many economic units because of the impact on the profits of company, and since the nineties of the last century the researchers and writers gave great attention to this subject, especially in light of the large competition and rapid developments in cost management techniques, as well as the wide and significant change in production methods that have been directed towards achieving customer satisfaction, all this and more driven by economic units in all sectors whether it is service or productivity to find methods that would reduc
... Show More