In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesium (Mg), calcium (Ca), chlorine (Cl), phosphate (PO4) and nitrate (NO3) were detected and analyzed. The grid soil samples on the site and surrounding areas have been investigated, analyzed, and compared to the background points. The storage area grid was divided into 30 major sectors and all samples were evaluated from acquires 10 samples from each sector. The detection results have indicated that SO4 level was exceeded the permitted level by 25 times, K level also exceeded the permitted level but by 460, Na ions were 85 times greater the permitted level. Mg level was 180 times higher than that of permitted content. Activity level of Ca in the soil samples of the study area has also exhibited variability with nine times over the permitted level near the bunkers. However, very high contamination spot activity of Cl was found in destruction zone about which 44 times over the background level was found while PO4 level exceeded the permitted level by 35 times over the permitted level and there was no activity detected for the nitrate in the storage area site.
Myriophyllum spicatum distribution in Al-Burgga marsh, Hor Al-Hammar was described in relation to some of the physical-chemical properties for its habitat (water depth, light penetration, water temperature, water salinity, pH, dissolved oxygen, Ca+2, Mg+2, reactive NO2=, reactive NO3-1, and reactive PO4-3) during 2011, seasonally. CANOCO ordination program (CCA) was used to analyse the data. Its vegetation cover percentage was with its peak at summer, its value was 90 %, while the lowest value was 20 % in winter. Statistically, Positive relationships for WT, sal., Ca+2, Mg+2, reactive NO2=, reactive NO3-1, and reactive PO4-3 with the vegetation cover percentage were observed. While, negative relationships for WD, pH, and DO with the ve
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreHeart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreLevan is an exopolysaccharide produced by various microorganisms and has a variety of applications. In this research, the aim was to demonstrate the biological activity of levan which produced from B. phenoliresistens KX139300. These were done via study the antioxidant, anti-inflammatory, anticancer and antileishmanial activities in vitro. The antioxidant levan was shown 80.9% activity at 1250 µg/mL concentration. The efficient anti-inflammatory activity of 88% protein inhibition was noticed with levan concentration at 35 µg/mL. The cytotoxic activity of levan at 2500 µg/mL concentration showed a maximum cytotoxic effect on L20B cell line and promastigotes of Leishmani tropica. Levan has dose-dependent anticancer and antileishmanial acti
... Show MoreMany studies and researchers have reported significant evidence that some physical properties of water can be changed as it passes through a magnetic field that can improve water use. This can have a promising potential for applications, especially in the fields of irrigation and drainage. In this research, magnetized water was used to leach salt-affected sandy loam soil. A test rig was designed and constructed to investigate the effects of magnetized water on leaching soil. The rig consists of a magnetization device that can provide variable intensity. Water was supplied from a constant head reservoir to the magnetization device then to the soils that were placed in plastic columns. Five different magnetic intensi
... Show More