Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
In 2020 one of the researchers in this paper, in his first research, tried to find out the Modified Weighted Pareto Distribution of Type I by using the Azzalini method for weighted distributions, which contain three parameters, two of them for scale while the third for shape.This research compared the distribution with two other distributions from the same family; the Standard Pareto Distribution of Type I and the Generalized Pareto Distribution by using the Maximum likelihood estimator which was derived by the researchers for Modified Weighted Pareto Distribution of Type I, then the Mont Carlo method was used–that is one of the simulation manners for generating random samples data in different sizes ( n= 10,30,50), and in di
... Show MoreWA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.
The construction industry plays a crucial role in the countries' economy, especially in the developed country. This point encourages the concerned institution to use new techniques and integrate many techniques and methods to maximize the benefits. The main objective of this research is to evaluate the use of risk management, value management, and building information modeling in the Iraqi construction industry. The evaluation process aims at two objectives. The direct objective was to evaluate the knowledge in risk management (RM), value management (VM), and building information modeling (BIM). The indirect objective was to support the participants with information related to the main items mentioned. The questionnaire
... Show MoreThis paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward
... Show MoreBeing the meeting points of the world different languages and out of a scholarly perspective, comparative literature represents a cultural leap as well as an artistic and intellectual development or a global literary movement of both prose and poetry. Such homogenous literary structure requires a systematic and coherent study of the literary output of the people different cultures and civilizations. It also represents the theoretical approach of the present study that debates a systematic comparison between Ghassan Kanafani’s All That's Left to You and William Faulkner’s. The Sound and the Fury. Within the perspective of the descriptive analysis approach, the present paper discusses th
... Show MoreThe purchase of a home and access to housing is one of the most important requirements for the life of the individual and the stability of living and the development of the prices of houses in general and in Baghdad in particular affected by several factors, including the basic area of the house, the age of the house, the neighborhood in which the housing is available and the basic services, Where the statistical model SSM model was used to model house prices over a period of time from 2000 to 2018 and forecast until 2025 The research is concerned with enhancing the importance of this model and describing it as a standard and important compared to the models used in the analysis of time series after obtaining the
... Show Moreيتناول هذا المقال تصورًا مستقبليًا لمؤسسات المعلومات في عام 2050، حيث يستعرض كيف ستتغير بنيتها لتصبح ذكية ومستدامة، ويستعرض دور أخصائي المعلومات في بيئة رقمية متقدمة. كما يناقش تطور مصادر المعلومات وخدماتها، ونُظم تنظيمها، بالإضافة إلى تنوع المستفيدين، مع إبراز دور هذه المؤسسات في دعم التنمية المستدامة
I dealt with this study of one of the hadiths of the Prophet and judged him after studying his deed, especially one of his narrations for the similarity in his name and the name of his father (Abdul Rahman bin Ishaq) Is he a civil "Sadok" or Wasti "weak" and they are in one layer which is called in the science of Hadith (agreed And after a review of Kutkut translations and wound and amendment and other evidence and evidence that it was "weak" and not as he went to him and asserted by the updated Muhammad Nasser al-Din al-Albani may God have mercy on him that in Sindh is a civil rule for the hadeeth "Hassan" and not as said The hadeeth is “weak” because he showed that it is the weak Wasti.
I ask God to be successful in this work an