The article examines metaphors as one of the fundamental means used by D. Rubina when writing the novel “Parsley Syndrome” to form images of dolls as equal heroes of the work. The author of the article continues research related to the work of Dina Ilinichna Rubina, a representative of modern Russian prose.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreReceipt date:06/23/2020 accepted date:7/15/2020 Publication date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License
The executive authority differs from one country to another, as it differs from a federal state to another according to the nature of the applied political systems, so this research focused on federal states according to their political systems, then going into the details of the executive authority and its role In the federal states by referring to the four federal experiments
... Show MoreThis research aims to identify the role of radio advertising in promoting purchasing decisions of Iraqi audiences, especially that the placement of the announcement through the Iraqi radio stations dealt with a little of Iraqi researchers, and the goal of the research to know the extent of public exposure to the radio advertising through Iraqi radio and patterns of exposure,disclosure of the reasons for public hearing of the radio advertisement, identifying the most important factors influencing the decision to buy in the radio advertisement, this research is descriptive in terms of type as the researcher used the survey method,questionnaire and scale for data and information collection, the sample was selected according to the purp
... Show MoreThe present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil
... Show MoreThis paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show MoreThe most important contemporary issues which related to the survey of the influence of communication development technology to land use sustainability. The research aims to explain the changes that happened in the quality & land use activities performance by understanding the transformations due to modern technology and its impact on current uses and its impact on changing functional relationships between those uses to create new combinations or hybrid uses.Research will follow the analytical descriptive approach in presenting the problem of research. Research has several conclusions & recommendations, one of conclusions is the change of the place concept and its relation to changing the concept of land use and its sustai
... Show MoreThe current research aims to find out the effect of strategic sensitivity in enhancing organizational immunity at the leadership levels in the Iraqi Ministry of Education, as the strategic sensitivity variable includes two dimensions (strategic foresight and strategic Insight), and the organizational immunity variable addresses three dimensions (organizational learning, organizational memory and organizational DNA). The main purpose of this research was related to the extent to which the Ministry’s immunity was achieved through the role played by strategic sensitivity. A sample of (349) individuals was selected . The questionnaire was relied upon to collect data, and the number of questionnaires suitable for analysis was (330). Re
... Show MoreThis study aimed at highlighting the role of small and medium enterprises in bringing about economic development in Jordan. The study examined the impact of the number, size of investment and the number of jobs provided by these enterprises on the rate of growth in gross domestic product (GDP) as an indicator for economic development. To achieve its objectives, the study adopted descriptive and quantitative analysis. A linear multi regression model was developed with a growth rate of GDP as dependent variable and the number of institutions, size of investment, and the number of job opportunities as independent variables. The study concluded that each increase by one small or medium enterprise lead to an increase in the rate of gr
... Show More