MRY *Khalid Sh. Sharhan, *Naseer Shukur Hussein, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreFine aggregates used for concrete works in Sulaymaniyah city frequently fail to meet the standard requirements for gradation and fineness modulus in cement concrete. This paper aims to critically evaluate gradation, fineness modulus, and clay contents of various natural sands produced and used for concrete work in the region. Sixteen field sand samples were collected from various sites in Darbandikhan (5 samples), Qalat Dizah (5 samples), Koysinjaq (5 samples), and Piramagroon (1 sample) confirming to ASTM D75. The field samples were parted into test specimens based on ASTM C702. Then, sieve analysis was carried out on the oven-dry test specimens in compliance with ASTM C136. The test results of fine aggregates wer
... Show MoreModern French novel has gained a distinctive status in the history of French literature during the first half of the twentieth century. This is due to many factors including the new literary descriptive objective style adopted by novelists like Alain Robbe – Grillet that has long been regarded as the outstanding writer of the nouveau roman, as well as its major spokesman, a representative writer and a leading theoretician of the new novel that has broken the classical rules of the one hero and evolved, through questioning the relationship of man and the world and reevaluating the limits of contemporary fiction , into creating a new form of narrative.
Résumé:
En vue de résu
... Show MoreThe antibacterial activity of some extracts of A. eupatoria (aqueous and ethanolic) against some pathogenic bacteria (Staphylococcus aureus, Pseudomonas aeruginosa and Escherichia coli ) and their activity on wound healing in rats , also the presence of some active compounds in both extracts were detected . The results showed that the ethanolic extract was more effective on inhibiting tested bacteria than the aqueous extract . P.aeruginosa was the most resistant bacteria, while highest inhibition zone appeared on E.coli (20 mm) .There was a moderate activity against S.aureus with inhibition zone 15 mm. by using ethanolic extract (10 mg/ml) . The phytochemical analysis for detection of active compounds revealed the presence of Carbohydrate
... Show MoreSage (Salvia officinalis), belong to Labiatae family is indigenous to Iraq and other Mediterranean areas but now cultivated world- wide, principally for its use as culinary herb. In the present study preliminary screening for the important phytochemical natural product groups indicated the presence of flavonoid, saponin, hyrolysable and condensed tannin groups. The antibacterial activity of two concentrations 10 mg/ml and 100 mg/ml of chloroform and hydroalcoholic extracts from Salvia officinalis leaves was evaluated against four strains of gram negative bacteria (Escherichia coli, Pseudomonas arigenossa, Klebsiella pneumonia, and Proteus spp) and two str
... Show MoreThe present study is concerned with Biostratigraphy of the Early-Middle Miocene outcrops of Jeribe Formation in the Zurbatiyah area, Wasit Governorate, Eastern Iraq. Forty-two Samples collected from Shur Sharin and AL-Hashima outcrop sections. The fossil content is rich in large and small benthic foraminifera; Twenty-one species and genus are identified in this study, in addition to coral, gastropoda, pelecypoda, ostracoda, alge, echinoid and shell fragments. According to the presence of benthic foraminifera, two Biozone have been identified in the Jeribe: Austrotrillina asmariensis-Dendritina rangi Concurrent Zone and Borelis melo curdica range zone.The age of the Formation determined as Early-Middle Miocene depending on these Bioz
... Show More