Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
New complexes of Al(III) such as [Al (Ura) (Phen) (OH2) Cl ] Cl. 2H2O, [Al(Ura)2(OA)(OH2)Cl].H2O and [Al(Ura)3Cl3]H2O type, where (Ura)=Uracil, (Phen)= 1,10-Phenanthroline monohydrate and (OA)= Oxalic acid dihydrate, were prepared. The elemental microanalysis, FT.IR, electronic spectra, and magnetic susceptibility as well as the conductivity measurements are characterized. For isolated three complexes for six coordinated of Al(III) are proposed with molecular formulas that depend on the nature of (Ura), (Phen) and (OA) present. The suggested molecular structure into all complexes for aluminum ion is octahedral geometries .The antibacterial efficacy was examined from metal salt (AlCl3), ligands and metal complexes into the pathogenic bacteri
... Show MoreSemi-active suspension systems have emerged as an attractive alternative to fully active suspensions because they offer a superior capacity to improve vehicle ride comfort and handling performance with significantly lower energy consumption. Conventional semi-active control strategies, however, such as skyhook damping, often cannot accommodate the nonlinear and time-varying dynamics of vehicles in operation under impulse or severe road disturbances. In this context, an intelligent smart-damper controller is proposed in this paper by incorporating a Modified Fuzzy Adaptive Fuzzy Logic Control framework in a half-car suspension model. In the developed controller, the effective damping force is adaptively tuned using real-time measurements of
... Show MoreCredential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi
... Show MoreTime series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MorePortland cement concrete is the most commonly used construction material in the world for decades. However, the searches in concrete technology are remaining growing to meet particular properties related to its strength, durability, and sustainability issue. Thus, several types of concrete have been developed to enhance concrete performance. Most of the modern concrete types have to contain supplementary cementitious materials (SCMs) as a partial replacement of cement. These materials are either by-products of waste such as fly ash, slag, rice husk ash, and silica fume or from a geological resource like natural pozzolans and metakaolin (MK). Ideally, the utilization of SCMs will enhance the concrete performance, minimize
... Show MoreThis study tests the effect of a large number of independent variables that control the growth of the total productivity, which amounted to 112 variables, gathered from what is mentioned in the specialized theoretical and applied literature. The data for these variables were taken from global reports of sound international organizations and reliable databases covering the period 1991-2016. The data of the dependent variable, the growth of the total factor productivity, were taken from the database of the world development indicators. The study covered 61 countries for which data were available. The study included three regression models to explain
... Show MoreGypseous soil covers approximately 30% of Iraqi lands and is widely used in geotechnical and construction engineering as it is. The demand for residential complexes has increased, so one of the significant challenges in studying gypsum soil due to its unique behavior is understanding its interaction with foundations, such as strip and square footing. This is because there is a lack of experiments that provide total displacement diagrams or failure envelopes, which are well-considered for non-problematic soil. The aim is to address a comprehensive understanding of the micromechanical properties of dry, saturated, and treated gypseous sandy soils and to analyze the interaction of strip base with this type of soil using particle image
... Show MoreBackground: A diverse group of bacteria live in biofilms in the oral cavity. On dental surfaces biofilms form plaque that is potentially involved in caries and periodontal diseases. Periodic studying of plaque microflora and their antimicrobial sensitivity patterns strongly affects the clinical practice in plaque-induced oral diseases. Materials and methods: Dental plaque samples were collected from 22 patients having ages ranged between 33 and 49 years with gingivitis that met the study criteria. Plaque, gingival and gingival bleeding indices (PI, GI, GBI) were measured for each patient. Laboratory procedures included microbiological examination of plaque samples followed by antibiotic sensitivity testing using disc diffusion method were
... Show More