Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThe purpose of this study was to investigate the effect of omega-3 poly unsaturated fatty-acids co-administered with the therapeutic dose of lornoxicam on liver of healthy rats. Twenty-eight adults male rats weighing 180-200g were used in this study and the animals were randomly divided into four groups of seven rats each. Group I: negative control/rats intraperitoneally injected with normal saline in a dose 5ml/kg/day; Group II: rats intraperitoneally injected with lornoxicam at dose 0.7 mg/kg/day; Group III: rats orally-administered omega-3 only at a dose 185mg/kg/day; Group IV: rats co-administered omega-3 (185mg/kg/day) orally and in
... Show MoreABSTRACT: Oxadiazole ring is a heterocyclic molecule with an oxygen and two nitrogen atoms spread throughout its five-membered structure. There are four different isomers that have been discovered, Because of their wide applications in a range of sectors, including medications . Some of these biological activity are; anticonvulsant capacity, anticancer as well, antibacterial, antiviral, antifungal, antimalarial, antitubercular, anti-asthmatic, antidepressant, antidiabetic, antioxidant, antiparkinsonian, analgesic and anti-inflammatory, are just some of the therapeutic uses that have drawn attention to drug candidates containing an oxadiazole moiety. This review, we will examine the various methods of oxadiazole synthesis. The mo
... Show MoreBackground: In young adults, multiple sclerosis is a prevalent chronic inflammatory demyelinating condition. It is characterized by white matter affection, but many individuals also have significant gray matter involvement. A double-inversion recovery pulse (DIR) pattern was recently proposed to improve the visibility of multiple sclerosis lesions. Objective: To find out how well a DIR sequence, FLAIR, and T2-weighted pulse sequences can find MS lesions in the supratentorial and infratentorial regions. Methods: A total of 37 patients with established diagnoses of multiple sclerosis were included in this cross-sectional study. Brain MRI was done using double inversion recovery, T2, and FLAIR sequences. The number of lesions was count
... Show MoreBackground: Background : Patients with non-rheumatic atrial fibrillation have high risk of thromboembolism especially ischemic stroke usually arising from left atrial appendage .Transoesophageal echocardiography provides useful information for risk stratification in these patients as it detects thrombus in the left atrial or left atrial appendage. Objective : This study was conducted at Al-Kadhimiya Teaching Hospital to assess the prevalence of left atrial chamber thrombi in patients with chronic non-rheumatic atrial fibrillation using transoesophageal echocardiography and its clinical significance as well as to verify the superiority of transoesophageal over transthoracic echocardiography in the detection of these abnormalities. Type of
... Show MoreThe Ligand 6,6--(1,2-benzenediazo) bis (3-aminobenzoicacid) derived from o-phenylenediamine and 3-aminobenzoicacid was synthesized. The prepared ligand was identified by Microelemental Analysis, 1HNMR, FT-IR and UV-Vis spectroscopic techniques. Treatment of the ligand with the following metal ions (CoII, NiII, CuII and ZnII ) in aqueous ethanol with a 1:1 M:L ratio and at optimum pH. Characterization of these compounds has been done on the basis of elemental analysis, electronic data, FT-IR and UV-Vis, as well as magnetic susceptibility and conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range (1×10-4 - 3×10-4 M). H
... Show MoreNew complexes of the type [ML2(H2O)2] ,[FeL2(H2O)Cl] and [VOL2] were M=Co(II),Ni(II) and Cu(II) ,L=4-(2-methyl-4-oxoquinazoline-3(4H)-yl) benzoic acid were synthesized and characterized by element analysis, magnetic susceptibility ,molar conductance ,FT-IR and UV-visible. The studies indicate that the L acts as doubly monodentate bridge for metal ions and form mononuclear complexes. The complexes are found to be octahedral except V(IV) complex is square pyrimde shape . The structural geometries of compounds were also suggested in gas phase by theoretical treatments, using Hyper chem-6 program for the molecular mechanics and semi-empirical calculations, addition heat of formation(?Hf ?) and binding energy (?Eb)for the free ligan
... Show More