Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreTwo EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreThe present work aimed to make a comparative investigation between three different ionospheric models: IRI-2020, ASAPS and VOACAP. The purpose of the comparative study is to investigate the compatibility of predicting the Maximum Usable Frequency parameter (MUF) over mid-latitude region during the severe geomagnetic storm on 17 March 2015. Three stations distributed in the mid-latitudes were selected for study; these are (Athens (23.50o E, 38.00o N), Jeju (124.53o E, 33.6o N) and Pt. Arguello (239.50o W, 34.80o N). The daily MUF outcomes were calculated using the tested models for the three adopted sites, for a span of five-day (the day of the event and two days preceding and following the event day). The calculated datasets were co
... Show MoreAbstract
The aim of the present research is to identify the test wisdom and the preoccupation with learning and psychological tension among postgraduate students at the University of Samarra according to the variables of the department, gender, age, and employee or non-employee, and revealing the relationship between the test wisdom and the preoccupation with learning and psychological tension. The research sample consisted of (75) students randomly selected from postgraduate students at the college of Education. The researcher applies test –wisdom of (Mellman & Ebel) and measurement of preoccupation with learning prepared by (Al-zaabi 2013) also, the researcher used the scale of t
... Show MoreThis study was conducted to investigate the presence of Staphylococcus aureus in the red and white meat available in local markets. They were selected ten samples of red and white meat randomly (Iraq, Saudi Arabia, Turkey, and Brazil) from different markets in Baghdad, and the results of reading the nutrition facts of media indication card showed that all models confirm to the Iraqi standard quality in terms of scanning all data of the media indication card, except for the birds of Bayader, where the date of expire & production date of the product was not mentioned. Also, the results of the study showed that there is no Staphylococcus aureus in local red and white meat as well as imported.
This current research aims to reveal the difference between the levels of teaching expertise of physics teachers according to the years of service by answering the following question: does the educational skill level of physics teachers work according to the service? The sample of the study consisted of (225) physics teachers by (125) females (56%), and (100) males (44%), distributed on (4) education directorates in Baghdad governorate on both sides of al-Karkh and al-Rusafa. In order to achieve the aim of the study, the researcher prepared a note card for expertise teaching, consisting of (39) paragraphs distributed into (5) fields. The apparent validity and reliability of the card were verified through an agreement (the researcher hers
... Show More