The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion detection systems in the cloud may provide challenges. The pre-established IDS design may overburden a cloud segment due to the additional detection overhead. Within the framework of an adaptively designed networked system. We demonstrate how to fully use available resources without placing undue load on any one cloud server using an intrusion detection system (IDS) based on neural networks. To even more successfully detect new threats, the suggested IDS make use of neural network machine learning (ML).
As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreThe porosity of materials is important in many applications, products and processes, such as electrochemical devices (electrodes, separator, active components in batteries), porous thin film, ceramics, soils, construction materials, ..etc. This can be characterized in many different methods, and the most important methods for industrial purposes are the N2 gas adsorption and mercury porosimetry. In the present paper, both of these techniques have been used to characterize some of Iraqi natural raw materials deposits. These are Glass Sand, Standard Sand, Flint Clay and Bentonite. Data from both analyses on the different types of natural raw materials deposits are critically examined and discussed. The results of specific surface are
... Show MoreThis work was influenced the separation and preconcentration steps were carried out to determination of metformin (MET) in pharmaceutical preparations and human serum samples. Complex formation method and cloud-point extraction (CPE) coupling with UV-Visible spectrophotometry were used to investigated of study target.The results has showed the best optical characteristic for calibration curve and statistical data which were obtained under optimum conditions. The first method is based on the reaction of MET with nickel (II) in alkaline medium an absorption maximum ?)max) at 434nm. ''Beer's low'' is obeyed in the concentration range (10-100µg.ml-1) with molar absorptivity of 3.9x103 L.mol-1.cm-1.The limit of detection and quantitation valu
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreA simple setup of random number generator is proposed. The random number generation is based on the shot-noise fluctuations in a p-i-n photodiode. These fluctuations that are defined as shot noise are based on a stationary random process whose statistical properties reflect Poisson statistics associated with photon streams. It has its origin in the quantum nature of light and it is related to vacuum fluctuations. Two photodiodes were used and their shot noise fluctuations were subtracted. The difference was applied to a comparator to obtain the random sequence.
The integration of arti cial intelligence (AI), whether through devices or software, has become a critical tool in analyzing and evaluating technical performance. AI signi cantly contributes to enhancing athletic performance by enabling accurate data analysis and supporting educators in developing effective training programs and interactive curricula. This study addresses a noticeable gap in the literature regarding the attitudes and inclinations of educators toward AI in physical education and sport sciences—a gap often attributed to limited awareness and lack of access to moderntechnologies.Theprimaryaimofthestudyistoexaminethetendenciesandperceptionsoffemaleinstructorsin physical education and sport sciences toward the use of AI
... Show MoreThe objective of drilling parameters optimization in Majnoon oilfield is to arrive for a methodology that considers the past drilling data for five directional wells at 35 degree of inclination as a baseline for new wells to be drilled. Also, to predicts drilling performance by selecting the applied drilling parameters generated the highest rate of penetration (ROP) at each section. The focal point of the optimization process is to reduce drilling time and associated cost per each well. The results of this study show that the maximum ROP could not be achieved without sufficient flow rate to cool and clean the bit in clay intervals (36" and 24") hole sections. Although the influence of combination of Weight on Bit (WOB), Round per minute
... Show MoreThe objective of drilling parameters optimization in Majnoon oilfield is to arrive for a methodology that considers the past drilling data for five directional wells at 35 degree of inclination as a baseline for new wells to be drilled. Also, to predicts drilling performance by selecting the applied drilling parameters generated the highest rate of penetration (ROP) at each section. The focal point of the optimization process is to reduce drilling time and associated cost per each well. The results of this study show that the maximum ROP could not be achieved without sufficient flow rate to cool and clean the bit in clay intervals (36" and 24") hole sections. Although the influence of combination of Weight on Bit (WOB), Round per mi
... Show More