The current research aims to identify the level of mental alertness among students of the Department of Chemistry in the Faculty of Education for Pure Sciences – Ibn Al-Haytham during the academic year (2022-2023). To achieve this goal, a descriptive approach was followed. The research community was identified as all chemistry students across the four grades (first, second, third, and fourth). A sample from each grade was selected for the current research. A tool was prepared to measure mental alertness within the research sample. The researcher adopted the scale by Baer, Smith, Kristemoyer, & Tany (2006), which was developed by Al-Buhairi et al. (2014), ensuring its validity, reliability, and psychometric characteristics, making i
... Show MoreThe Assignment model is a mathematical model that aims to express a real problem facing factories and companies which is characterized by the guarantee of its activity in order to make the appropriate decision to get the best allocation of machines or jobs or workers on machines in order to increase efficiency or profits to the highest possible level or reduce costs or time To the extent possible, and in this research has been using the method of labeling to solve the problem of the fuzzy assignment of real data has been approved by the tire factory Diwaniya, where the data included two factors are the factors of efficiency and cost, and was solved manually by a number of iterations until reaching the optimization solution,
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreThe deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show MoreThe aim of the research is to shed light on the dimensions of the strategic lens and its impact on achieving the pioneer tax performance and represented by the dimensions (strategic direction, growth, pilot indicator, renewal and modernization, efficiency and effectiveness) in the General Tax Authority. The questionnaire was adopted as a tool to collect data and information from the adult sample They are (91) who are on the site (Assistant Director General, Head of Division, First Division Deputy, Second Division Deputy, Division Officer, Division Officer Associate) The statistical program (SPSS) has been used to calculate (the mean, the standard deviation, the correlation coefficient, the difference coefficient, the F test, the
... Show MoreBy- products of corn starch industry were used to prepare media for propagation the lactic acid bacteria as a natural auxotroph. The by- products used were the corn steep water (S) and gluten extract (G) after a proper treatment to get them ready for media preparation. The results showed that it was possible to replace the peptone and meat extract by gluten extract in MRS medium. The growth was approximately similar to that obtained in standard MRS media. Corn steep water (S) was used as well and the growth enhanced by including Tween – 80 at 1% level. The later media named MZ, which was superior for growing standard and local strains and starters. The MZ medium modified by adding acetate and glacial acetic acid similarly to
... Show MoreThe aim of this research is analysis the effect of the changes in (GDA, g, inflation) at average and standard economic curriculum in composition of the models, depending on SPSS program in analysis, and according to available date from central bank of Iraq and during the period from 2003 to 2018 and by using OLS and estimate of the equation and the results showed a statistical significance relation in incorporeal level 5% and the R2 value equal to 92.1 refer to the changes in independent variables explain 92% of changes of unemployment and the independent variables effect are very limit depend on estimated parameters in the model and respectively (0.986,0.229,-0.060), the research recommended necessity to active the inve
... Show More