NA Nasir, SHM Ali, HQMA AL-Ess, WA Hussein, MKW Al-Janabi, KIA Mohammed, JM Mosa, Euromediterranean Biomedical Journal, 2020
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThis paper presents a comparative study between different oil production enhancement scenarios in the Saadi tight oil reservoir located in the Halfaya Iraqi oil field. The reservoir exhibits poor petrophysical characteristics, including medium pore size, low permeability (reaching zero in some areas), and high porosity of up to 25%. Previous stimulation techniques such as acid fracturing and matrix acidizing have yielded low oil production in this reservoir. Therefore, the feasibility of hydraulic fracturing stimulation and/or horizontal well drilling scenarios was assessed to increase the production rate. While horizontal drilling and hydraulic fracturing can improve well performance, they come with high costs, often accounting for up t
... Show MoreThe research aims to identify the effect of jigsaw strategy in learning achievement and engaging for the third grade intermediate students in chemistry. The research sample consisted of (61) students distributed in two experimental and control groups. The research tools consisted in the achievement test and the measure of engaging learning. The results showed that there are statistically significant differences at the level of (α = 0.05) between the experimental group and the control group in both the achievement test and the measure of learning involvement for the benefit of the experimental group. In this light, the researcher recommended the use of jigsaw strategy for teaching the subject matter. Lamia because of its impact in raising
... Show MoreObjectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe research aimed at designing teaching program using jigsaw in learning spiking in volleyball as well as identifying the effect of these exercises on learning spring in volleyball. The researchers used the experimental method on (25) students as experimental group and (27) students as controlling group and (15) students as pilot study group. The researchers conducted spiking tests then the data was collected and treated using proper statistical operations to conclude that the strategy have a positive effect in experimental group. Finally, the researchers recommended using the strategy in making similar studies on other subjects and skills.