Preferred Language
Articles
/
alkej-137
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
Iraq's role in US security arrangements In the Greater Middle East project
...Show More Authors

إن موضوع الشرق الأوسط بشكل عام اتخذ أهمية كبيرة في الكتابات والمؤلفات التي صدرت منذ بداية النصف الأول من عقد التسعينات من القرن المنصرم مع بدايات مشاريع السلام التي أعقبت انهيار الاتحاد السوفيتي وتغير الخارطة السياسية والاقتصادية والايديولوجية للعالم .وعلى الرغم ان المصطلح ليس بجديد الا ان تعابير المصطلح وددلالاته تتغير مع تغير موازين القوى واتجاهات المصالح. إذ انتقل من مصطلح جغرافي الى

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The strategy of preventive war In US National Security Documents (2002-2006)
...Show More Authors

The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
The impact of the internet of things on information institutions from the perspective of library employees
...Show More Authors

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Valuation of consumer purchasing behavior over the internet And its relation to personal variables: / exploratory research
...Show More Authors

The objective of the research was to evaluate consumer purchasing behavior through the Internet, such as consumer behavior, reasons for buying online, purchasing advantages over the Internet, personal variables (gender, age, marital status, education level, income, and income and job type). The questionnaire was adopted as a main tool in the survey of the views of a sample of consumers in Baghdad governorate (100) people and analyzed their answers using the statistical program SPSS in calculating the mean and standard deviation Centigrade, correlation coefficient (R) and test ( ). The main findings of the research were:

  1. There is a positive and positive relationship between consumer purchasing behavior via the Internet and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
بيت الحكمة
دور مجلس المنافسة في الحد من الممارسات التمييزية ضد العمالء
...Show More Authors

Publication Date
Mon Jan 01 2007
Journal Name
Journal Of Educational And Psychological Researches
اتجاهات الشباب نحو استخدام العنف ضد المرأة في مدينة بغداد
...Show More Authors

تشير الادبيات الى ان العنف قد رافق الانسان منذ بدء الخليقة حتى يومنا هذا، الا ان التطور العلمي والتكنلوجي والسرعة الفائقة في التغيير قد زاد من حجمه، وعدد مثيراته واختلفت نوعيته تبعاً لارتقاء الانسان ( العكيلي، 2000، ص91).

يتسم القرن الحادي والعشرين بظاهرة العنف بشكل عام، حيث لم تسلم منطقة منه، وهذا لا يمثل تهديداً لمنجزات الانسان المادية والاجتماعية فقط، ولكنه يمتد نحو الانسان ذاته. وسلوك الع

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Role of Managerial Accounting Information System in Improving the Value Chain and its Impaction Evaluation Performance: دراسة حالة في الشركة العامة لصناعة الزيوت النباتية
...Show More Authors

The performance measures and traditional methods used in management accounting is no longer able to provide convenient to evaluate the performance of economic units in the modern manufacturing environment information، and so this information is more important and feasibility must be Mistohat of all the company's activities and functions، and it is a problem Find the inadequacy of information management accounting that contribute to meet the needs of the upper levels of management to cope with the problems resulting from the increased size and complexity of the business، and lack of management accounting information and methods used in the performance evaluation، which reflected negatively on the value chain activities and then on the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 24 2022
Journal Name
Egyptian Journal Of Chemistry
A novel Tubular Electrochemical Reactor with a Spiral Design of Anode for Treatment of Petroleum Refinery Wastewater
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 12 2015
Journal Name
J. Genet. Environ. Resour. Conserv
Effect of arbuscular mycorrhizal fungi as a biocontrol agent and organic matter against fusarium wilt in tomato
...Show More Authors

The objective of this investigation was to study the effects of a mixture of three arbuscular mycorrhizae (Glomus etunicatum, G. leptotichum and Rhizophagus intraradices) on the development of fusarium wilt disease in tomato plants in the presence and absence of organic matter (peatmoss). Results indicated an increase in mycorrhizal root dry weight especially in the presence of the organic matter, on the other hand this parameter was significantly decreased when Fusarium oxysporum f. sp. Lycopersiciwas added simultaneously with the mycorrhiza, Moreover, mycorrhiza and organic matter significantly reduced the damping off seedling disease, disease severity and rate of infection of tomato leaves and roots caused by the pathogenic fungus, These

... Show More