Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Background: Hypertension is probably the most important public health problem around the world. People with periodontal disease may be at greater risk of hypertension. The inflammatory effects of periodontal disease help to promote endothelial dysfunction in arteries which may lead to changes in blood pressure. Salivary MMP-8 has been associated with both periodontal disease and prevalent hypertension. Aim of study: This study was conducted to measure salivary matrix metalloproteinase - 8, in relation to periodontal health condition among a group of patients with hypertension in comparison with control group. Materials and methods: Ninety subjects, aged 45-50 years old were included in this study, seeking treatment for chest pain in Ibn-A
... Show MoreIslamic banks are a financial institution that is interested in attracting financial savings from financial entities and directing them towards those with financial deficits, both for consumption purposes or for investment purposes. It provides banking services provided by commercial banks and other services But based on the principles and principles of Islamic law, and because of its recent emergence in Iraq, its ability to attract savings is not like non-Islamic commercial banks, which puts them in the option of using their capital to achieve its objective of banking. The research started from the premise that "Islamic banks in Iraq during the period (2008-2012) rely on their capital to perform their activities more than they rely on d
... Show MoreThe concept of training is no longer traditionally understood Limited organize traditional training courses, but has become a strategic choice in the investment and development of human resources system, attic trying to find the answer to the core problem of the study which
is the extent to which the training process, the traditional form that meets the needs of the company the development of intellectual capital.This research aimstostatementof the impact dimensions the training process(training role, support or top management , training programs, modern technology)of the in components Intellectual Capital(Human Capital, Structural Capital, Customer Capital) and provide the top management of the Company for the development of sci
... Show Morethis study deals with effect of diabetes and hypertension on quality of life
This paper presents the implementation of a complex fractional order proportional integral derivative (CPID) and a real fractional order PID (RPID) controllers. The analysis and design of both controllers were carried out in a previous work done by the author, where the design specifications were classified into easy (case 1) and hard (case 2) design specifications. The main contribution of this paper is combining CRONE approximation and linear phase CRONE approximation to implement the CPID controller. The designed controllers-RPID and CPID-are implemented to control flowing water with low pressure circuit, which is a first order plus dead time system. Simulation results demonstrate that while the implemented RPID controller fails to stabi
... Show More
Facing industrial companies many pressures and challenges due to rapid changes in the business environment of contemporary, which requires them to do their performance look more inclusive rather than limiting performance evaluation on the financial perspective in spite of its importance, prompting companies to rethink their reality competitive through the adoption of methodologies and new philosophies to manage competitiveness of total quality management, and re-engineering of production processes, and knowledge management,... etc., as This study framework cognitive and practical "to evaluate the performance of a company Diyala General Electric Industries and how to rehabilitate
Surgical site infections are the second most common type of adverse events occurring in hospitalized patients. Surgical antibiotic prophylaxis refers to the use of preoperative and postoperative antibiotics to decrease the incidence of postoperative wound infections. The objective of this study was to evaluate the antibiotic administration pattern for surgical antibiotic prophylaxis and the adherence to American Society of Health-System Pharmacists surgical antibiotic prophylaxis guideline in Medical City Teaching Hospitals/Baghdad. The medical records of one hundred patients who underwent elective surgical procedures were reviewed. Adherence to the recommendations of American society of health‑system pharmacists guideline was ass
... Show MoreThe paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)
Preparation of identical independent photons is the core of many quantum applications such as entanglement swapping and entangling process. In this work, Hong-Ou-Mandel experiment was performed to evaluate the degree of indistinguishability between independent photons generated from two independent weak coherent sources working at 640 nm. The visibility was 46%, close to the theoretical limit of 50%. The implemented setup can be adopted in quantum key distribution experiments carried out with free space as the channel link, as all the devices and components used are operative in the visible range of the electromagnetic spectrum.