The process of identifying the region is not an easy process when compared with other operations within the attribute or similarity. It is also not difficult if the process of identifying the region is based on the standard and standard indicators in its calculation. The latter requires the availability of numerical and relative data for the data of each case Any indicator or measure is included in the legal process
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
The present paper focuses on the study of some characteristics of
comets ions by photometry method which represent by CCD camera
which it provide seeing these images in a graded light. From 0-255
when Zero (low a light intensity) and 255 (highlight intensity). These
differences of photonic intensity can be giving us a curve which
appear from any line of this image.
From these equations the focus is concentrating on determine the
temperature distribution, velocity distribution, and intensity number
distribution which is give number of particles per unit volume.
The results explained the interaction near the cometary nucleus
which is mainly affected by the new ions added to the density of the
solar wind, th
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe experiment was carried out to study the effect of NPK and Inicium using two concentration for each of them 1 and 2 gm/L for NPK and 5 and 10 ml/L for Inicium on some physiological characters of Lycopersicon esculentum and mitotic division index of seedling radical apex. The results showed that all the characters increased plant height, stem diameter, leaves number, length of leaf, lobs number in one leaf, length of root and root diameter. The data showed that the percentage of cell division, mitotic division and Telophase stage increased in seedling radical apex comparison with control plants.
Cadmium oxide (CdO) thin films were deposited using the sequencing ion layer adsorption and reaction (SILAR) method. In this study, the effect of the pH value of an aqueous solution of cadmium acetate at a concentration of 0.2 mol of the cadmium oxide film was determined. The solution source for the cadmium oxide film was cadmium ions and an aqueous ammonia solution. The CdO films were deposited on glass substrates at a temperature of 90 ℃. The cadmium oxide film thickness was determined by the weight difference method at pH values (7.2, 8.2). X-ray diffraction (XRD) and scanning electron microscopy (SEM) showed that the size of the crystals increased with the increase in the solution (pH). While the UV-visible spectra of the fil
... Show MoreThe research aim to the usage educational method for jump shooting and it effect on speed strength in basketball for the specialist students in College Sport of Dayla University, which used the following statistic treatment (The T.test for compatible specimens), so after statistic treatment which appears theres a tow moral differences in speed strength and jump shooting tests results to (legs & arms) for the before and after tests, and after that the conclusions we positive and the second the special drills effect immaterial speed strength to legs and arms, so the tow researches recommended to looking after the best for educational methods that used in our sport colleges in Iraq.
In this work, an important sugar alkynyl ether has been synthesized in two subsequent steps starting from commercially available D-galactose (3). This kind of compounds is highly significant in the synthesis of biologically active molecules such as 1,2,3-triazole and isoxazoles. In the first step, galactose (3) was reacted with acetone in the presence of anhydrous copper (II) sulfate to produce 1,2:3,4-di-O-isopropylidene-α-D-galactose (4) in good yield. The latter was reacted with excess of 3-bromoprop-1-yne in DMF in the presence of NaOH pellets to afford the target molecule 5 in a very good yield. The temperature of this step is crucial in determining the reaction yi
... Show More