The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreIn this work a novel drug delivery system through modification of poly acrylic acid with Methionine as a spacer between the poly acrylic acid which was converted to its acyl chloride and reacted with Methionine as spacer unit which has been reacted with Ampicillin drug. In vitro drug release study had been conducted successfully in basic medium in pH 7.4 and acidic medium in pH 1.1 at 37?. Due to many problems associated with drug release and, this modification could decrease the side effect of drug. The prepared prodrug polymer was characterized by spectra method [FTIR and 1H?NMR]. Physical properties and intrinsic viscosity of drug polymer were determined. The good results were obtained in the presence of spacer unit with compar
... Show MorePure and doped barium titanate with Mg2+ ion at two molar ratios x= (5%, 10%) mol. has been synthesized by solid state reaction technique. The powders sintered at two temperatures (1000 °C and 1400 °C). An XRD technique was used in order to study the crystal structure of pure and doped barium titanate, which confirmed the formation of the tetragonal phase of BaTiO3, and then calculate the lattice parameters of pure and doped barium titanate, the addition of magnesium ion Mg2+ can lead to decreases lattice parameters.
Pure and doped barium titanate with Mg2+ ion at two molar ratios x= (5%, 10%) mol. has been synthesized by solid state reaction technique. The powders sintered at two temperatures (1000 °C and 1400 °C). An XRD technique was used in order to study the crystal structure of pure and doped barium titanate, which confirmed the formation of the tetragonal phase of BaTiO3, and then calculate the lattice parameters of pure and doped barium titanate, the addition of magnesium ion Mg2+ can lead to decreases lattice parameters.
We report a new theranostic device based on lead sulfide quantum dots (PbS QDs) with optical emission in the near infrared wavelength range decorated with affibodies (small 6.5 kDa protein-based antibody replacements) specific to the cancer biomarker human epidermal growth factor receptor 2 (HER2), and zinc(II) protoporphyrin IX (ZnPP) to combine imaging, targeting and therapy within one nanostructure. Colloidal PbS QDs were synthesized in aqueous solution with a nanocrystal diameter of ∼5 nm and photoluminescence emission in the near infrared wavelength range. The ZHER2:432 affibody, mutated through the introduction of two cysteine residues at the C-terminus (
Background: The apical seal is the single most important factor in determining the success of surgical endodontics, the aim of this study was to compare the sealing ability of Mineral Trioxide Aggregate in three different cavity designs. Materials and Methods: Thirty extracted human single-rooted teeth were divided into three groups of ten teeth per group, a retrograde cavity preparation was carried out using a low speed handpiece and round bur with parallel walls in the first group, ultrasonic retrotip and unit in the second group and a low speed handpiece with a carbide inverted cone bur with undercuts in the third group, all the cavities were filled with MTA. microleakage was measured by dye penetration technique using methylene blue. Re
... Show MoreIn this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
Introduction: Dental fear is defined as the patient’s specific reaction towards stress related to dental treatment in which the stimulus is unkn..
Single Walled Carbon nanotubes (SWCNTs), as nano-needle structures, are good candidates as nanocarrier delivery systems that carry drug to the site of action. They are good due to their unique pharmaceutical properties. Teniposide is an anticancer drug, which is widely used, but it has a problem of low solubility. In this study, to improve the properties of carbon nanotubes, pre-functionalization of carbon nanotubes via carboxylation with strong acids has been performed and then functionalized through attaching them to the polymer and copolymer. Concurrently, a proper polymer-copolymer combination has been selected by the UV-Visible spectrometer at 880nm. It is selected based on the qualitative dispersibility analysis, the visual observa
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More