Through the researchers' acquaintance with the previous studies, the problem was identified as that the preparation of training curricula in all its units must be based on accurate scientific foundations. Positively affect the type of attack and its implication in the presence of correlational relations, whether direct or indirect, i.e., precedence in training and in preparing units Therefore, the researcher decided to build a causal model to know the relationships to show the best model of the direct straight attack. The study aimed to build a causal model for the most important physical measurements and kinetic capabilities of the direct straight attack in the research sample. The two researchers used the descriptive approach in the manner of causal relationships, so the two researchers conducted the experiment on a sample of the second stage students, whose number is (85) students out of (109) students, and they were chosen according to the equation. Stephen Sampson After conducting the exploratory experiment and performing the measurements and tests of the research, they were classified and treated statistically, so they conclude the validity of the causal model in stating the precedence of the variables.
As a result of the increase in wireless applications, this led to a spectrum problem, which was often a significant restriction. However, a wide bandwidth (more than two-thirds of the available) remains wasted due to inappropriate usage. As a consequence, the quality of the service of the system was impacted. This problem was resolved by using cognitive radio that provides opportunistic sharing or utilization of the spectrum. This paper analyzes the performance of the cognitive radio spectrum sensing algorithm for the energy detector, which implemented by using a MATLAB Mfile version (2018b). The signal to noise ratio SNR vs. Pd probability of detection for OFDM and SNR vs. BER with CP cyclic prefix with energy dete
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreStandards play a vital role in documenting the values of new test results in the form of tables. They are one of the basic requirements that the standardization process aims for as a complement to standardizing test procedures, and contribute to knowing the current reality of the student. The degree of readiness and level as a result of practicing different exercises for sports activities, in addition to the possibility of adopting it for comparison with his group or similar groups, classification, prediction and selection. Developing the skill of handling the football in the educational field is an important matter for achieving distinguished performance among students. This skill requires a level of accuracy, speed and control, and
... Show MoreQuality control charts are limited to controlling one characteristic of a production process, and it needs a large amount of data to determine control limits to control the process. Another limitation of the traditional control chart is that it doesn’t deal with the vague data environment. The fuzzy control charts work with the uncertainty that exists in the data. Also, the fuzzy control charts investigate the random variations found between the samples. In modern industries, productivity is often of different designs and a small volume that depends on the market need for demand (short-run production) implemented in the same type of machines to the production units. In such cases, it is difficult to determine the contr
... Show MoreThe study of Shiranish Formation rocks in southern part of Iraq at Ansab area well (KH-6)
were carried out. The formation is tongued with tayarat formation, which bounded from top
and bottom, the upper tongue at thickness 49m. and tongued at depth (476-525m.) the lower
tongue at thickness 4m. tongued at (541-537m.).
The rocks of this formation were divided into three sedimentary microfacies:
1- Dolomitized formininferal Wackestone facies.
2- Dolomitized formininferal Mudstone facies.
3- Dolostone facies.
34 slides were investigated depending on mineralogical, compositional and biological
processes and compared diagenesis which reflect open marine shelf at lower part of formation
(F.Z.2) (S.M.F.8), but at the
Flame atomic absorption spectrophotometer (FAAS) was used in this study to determine the concentrations of heavy metals such as Ca, Fe, Mn, Cd, Co, Cr, Ni, Cu, Pb and Zn in some food additives of Iraq. The order of metal contents in food additives was found to be Ca ˃ Mn ˃ Fe ˃ Cu ˃ Zn ˃ Pb ˃ Cr ˃ Ni ˃ Co ˃ Cd. The concentration level of each metal was compared with that recommended by food agriculture organisation (FAO) and world health organisation (WHO). Calibration curves were linear for all standard solutions of heavy metals in the range starting from 0.02-0.4 mg/kg for Cd to 11-100 mg/kg for Ca. The correlation coefficients values (R2) of calibrations were investigated and ranged from 0.9971 for Cr to 0.9999 for Ca. Th
... Show MoreIn this paper, the effect of changes in bank deposits on the money supply in Iraq was studied by estimating the error correction model (ECM) for monthly time series data for the period (2010-2015) . The Philips Perron was used to test the stationarity and also we used Engle and Granger to test the cointegration . we used cubic spline and local polynomial estimator to estimate regression function .The result show that local polynomial was better than cubic spline with the first level of cointegration.
The purpose of this research is to design a list of the scientific and moral values that should be found in the content of the computer textbook for the second intermediate grade, as well as to analyze the content of the above- mentioned book by answering the following question:
What is the percentage of availability of scientific and moral values in the content of the computer textbook for Second Intermediate grade issued by the Iraqi Ministry of Education / the general directorate of the curriculum, for the academic year (2017-2018)?
In order to achieve the research objectives, the descriptive method (content analysis method) was adopted. The research community has been iden
... Show More