With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreObjective: Knee osteoarthritis is a common disabling chronic disease globally. Many pharmacological agents have been used efficiently in treatment of knee osteoarthritis. This study aims to evaluate metformin and serratiopeptidase together in treatment and stop of osteoarthritis progression by different mechanisms. Methods: Present study was a randomized clinical trial study conducted in Al-Kindi teaching hospital through the period from 1st January to 30th of May, 2017 on two groups of 80 osteoarthritis patients (group I; treated with metformin 850 mg oral tablets) and (group II; treated with metformin 850 mg oral tablets and serratiopeptidase 20 mg oral tablets). Parameters of two groups were compared with those of 40 normal healt
... Show MoreThis work concerns the synthesis of two types of composites based on antimony oxide named (Sb2O3):(WO3, In2O3). Thin films were fabricated using pulsed laser deposition. The compositional analysis was explored using Fourier transform infrared spectrum (FTIR), which confirms the existence of antimony, tungsten, and indium oxides in the prepared samples. The hall effect measurement showed that antimony oxide nanostructure thin films are p-type and gradually converted to n-type by the addition of tungsten oxide, while they are converted almost instantly to n-type by the addition of indium oxide. Different heterojunction solar cells were prepared from (Sb2O3:WO
... Show MoreThe traditional city suffers from the decline of the urban image due to urban development and homogeneity with the urban context of the city, and because of the lack of determinants governing the urban image, it is that the center of the city of traditional Kadhimiya suffers from a break in the urban image, Therefore, the research included how to build a distinctive urban image of the center of the traditional city of Kadhimiya and achieve the visual pleasure and comfort of the recipient and the urban image here means is an image not picture which are related to several aspects, including physical, social and psychological as well as the collective memory of individuals and their rela
Polymers, being one of the most important materials in dentistry, offer great physical and mechanical qualities, as well as good biocompatibility. Aim of this study was done to evaluate the Polyetherketoneketone and Polyetherketoneketone polymer composite material used as dental implant through tensile strength, Fourier Transform Infrared analysis FTIR, and wettability). Polyetherketoneketone composites (Polyetherketoneketone and Strontium-containing hydroxyapatite) with selected weight percentage ratios of (0, 10%, 20%, 30%), were fabricated using a compression molding technique”, The study involved Samples preparation (sheets) shaped and form into the desired shape according to standard for tests which included tensile strength,
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThe study aimed to monitor the concept of reputation in the previous literature, its relationship to mental image and identity, and to reveal recent trends in its measurement Techniques.
The study relied on a descriptive approach using library survey and comparative analysis, and the study reached following conclusions:
Despite the beginning of the first signs of reputation In the fifties of the last century, however, Defining and standardizing the concept with clear and specific dimensions began in the 1990s and the beginning of the third millennium. The concept of reputation refers to the stakeholders’ overall evaluation of organizations, which reflects their perceptions of
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show More