Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show MoreThe present study aims at finding out the (effect of the Caroll’s pattern on the second intermediate class pupils' achievement in geography)
The partial experimental design of two groups, experimental and control, with pre-post tests is used. The sample is represented in (74) female pupils. The sample is divided into two groups (38) experimental group and (36) control one. The sample is selected from first intermediate class pupils ( Am Salama Secondary School for girls) \ Baghdad\ Al-karkh-1, for academic year 2015-2016.
The researcher has equalized the two groups in several variables: the previous achievement tests, intelligence, age in months, the scor
... Show MoreIraq enjoys many factors and ingredients that made it “affect and be affected at the same time” by the American-Iranian conflict from the “strategic geographical position” adjacent to Iran as an important point and that Iraq has been part of this conflict since the last period which witnessed the outbreak of the first Gulf War (1980-1988) because of border problems and a dispute over Shatt al-Arab, and what followed after that, specifically from 2003 when the United States of America and its allies occupied Iraq’s lands and made a political change by the destruction of its security and military institutions. It increased the importance of Iraq in being a subject of competition between the competing parties in exploiting the
... Show MoreThis research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show MoreTo synthesize new hydrazone derivatives of naproxen with enhanced anti-inflammatory activity and devoid the ulcerogenic side effects. Hydrazones were synthesized by conjugation of naproxen hydrazide with seven natural and synthetic aldehyde and ketone by using glacial acetic acid as catalyst. The synthesis has been carried out following simple methodology in excellent isolated yields.The structure of the synthesized derivatives has been characterized by elemental microanalysis (CHN), FTIR Spectroscopy, and other physicochemical properties.The anti- inflammatory activity of the synthesized compounds was evaluated in vivo using the egg-white induced edema model in rats, and the results of the biological assay was found to be comparable to Nap
... Show MoreThe research, which was drawn from his doctoral thesis (People's Policy towards Vietnam 1949-1979), discussed the roots of the connections between the Chinese and Vietnamese communists since the 1920s, the presence of Ho Chi Minh and other Vietnamese communists in China, their influence by the revolutionary struggle of the Chinese Communist Party and their establishment of a group of The Vietnamese Revolutionary Societies and the Indo-Chinese Communist Party until the outbreak of the Vietnamese Revolution and their success in declaring the establishment of the Democratic Republic of Vietnam in 1946. Keywords: Ho Chi Minh, Chinese Communist Party, Indo-Chinese Communist Party, Democratic Republic of Vietnam, Chou En Lai.
The current study examines the poetry) free verse( of African American Amanda Gorman in the light of the African diaspora concept, with a focus on themes of migration, African American identity, and cultural interactions. Additionally, the chosen poems discussed poets who resided in or outside of Africa, their native continent. The importance of this study lies in the fact that it sheds light on an axis that has been ignored in criticism of Gorman's poems —specifically, the axis of the African diaspora—rather than just feminism and marginalization. The purpose of this research is to emphasize the value and impact of leaving one environment to live in another, which takes adaptability, patience, and fortitude to finish the journey of lif
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MoreKE Sharquie, AA Noaimi, EA Al-Janabi, Our Dermatology Online, 2014 - Cited by 11