Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
In this paper, the Active Suspension System (ASS) of road vehicles was investigated. In addition to the conventional stiffness and damper, the proposed ASS includes a fuzzy controller, a hydraulic actuator, and an LVDT position sensor. Furthermore, this paper presents a nonlinear model describing the operation of the hydraulic actuator as a part of the suspension system. Additionally, the detailed steps of the fuzzy controller design for such a system are introduced. A MATLAB/Simulink model was constructed to study the proposed ASS at different profiles of road irregularities. The results have shown that the proposed ASS has superior performance compared to the conventional Passive Suspension System (PSS), where the body displacemen
... Show MoreSocial networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the ques
... Show MoreCorruption has become the subject of great interest, and the subject of research and scrutiny in recent years, because of its penetration in all fields of life, whether these fields are political, economic, social, and administrative. It is one of the biggest challenges and problems that are facing communities. Therefore, this study is focused on the evaluation of measures implementing the national strategy to combat corruption in Iraq.
This study was launched, first because of its intellectual dimensions to ensure a conceptual presentation of the strategy and operational management in general with a special focus on the processes of implementation and control str
... Show Moreتحتل ضريبة الدخـل على نقل ملكية العقار خصوصية عن بقية مصادر الدخل الاخرى وذلك لكونها تفرض على نقل ملكية العقار ومنافعه , حيث كانت تفرض الضريبة بموجـب قانون ضريبة الدخل رقم 113 لسنة 1982 والذي جاء هذا القانون غير بعيد عن مضمـون القانون رقم 95 لسنة 1959 وأهم مايلاحظ عليه بالنسبة لأرباح نقل ملكيـة العقـار أو نقل حق التصرف فيه هو أن الربح أو الخسارة الناتجة عن بيع العقار المسبوق بشراء يتـم عـن طريق القيمة أو البدل أي
... Show MoreThe aim of the current study is to identify the effectiveness of cognitive conflict strategy in comprehending reading among literary fifth students in literature and literature texts. The researcher uses experimental method with partial control. The sample consisted of (80) students distributed into control and experimental groups. The scientific material, the behavioral goals, the teaching plans, and the instrument of the research have been prepared (reading comprehension test) by the researcher.
The instrument's validity and reliability have been calculated and then applied to the sample. After treating the data statistically by using SPSS, the results have revealed that there is a statistically significant difference at the si
... Show MoreStudents' passive listening to their teacher's reading is one of main
reasons behindtheir weakness in the reading skill which in its turn may
hinderachieving the in desired objectives.
When exploiting critical thinking, which will lead to deeper
understanding of the intellectual content, in learning and accurate and
correct students' outcomes.
Active listening allows paying attention to the speaker, asking him,
arguing with him, judging what he says, and making decision on what
he says. For this reason, the researcher felt the need for preforming a
study to identify the effect of critical listening on developing students'
critical thinking at reading in the Kurdish language department.
The researcher has
Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MoreThe advancements in horizontal drilling combined with hydraulic fracturing have been historically proven as the most viable technologies in the exploitation of unconventional resources (e.g., shale and tight gas reservoirs). However, the number of fractures, well timing, and arrangement pattern can have a significant impact on the project economy. Therefore, such design and operating parameters need to be efficiently optimized for obtaining the best production performance from unconventional gas reservoirs. In this study, the process of selecting the optimal number of fractures was conducted on a section of a tight gas reservoir model (based on data from the Whicher Range (WR) tight gas field in Western Australia). Then, the optimal number
... Show MoreVarious theories have been proposed since in last century to predict the first sighting of a new crescent moon. None of them uses the concept of machine and deep learning to process, interpret and simulate patterns hidden in databases. Many of these theories use interpolation and extrapolation techniques to identify sighting regions through such data. In this study, a pattern recognizer artificial neural network was trained to distinguish between visibility regions. Essential parameters of crescent moon sighting were collected from moon sight datasets and used to build an intelligent system of pattern recognition to predict the crescent sight conditions. The proposed ANN learned the datasets with an accuracy of more than 72% in comp
... Show More