Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Heart disease identification is one of the most challenging task that requires highly experienced cardiologists. However, in developing nations such as Ethiopia, there are a few cardiologists and heart disease detection is more challenging. As an alternative solution to cardiologist, this study proposed a more effective model for heart disease detection by employing random forest and sequential feature selection (SFS). SFS is an effective approach to improve the performance of random forest model on heart disease detection. SFS removes unrelated features in heart disease dataset that tends to mislead random forest model on heart disease detection. Thus, removing inappropriate and duplicate features from the training set with sequential f
... Show More Background: The resistance to antimicrobial factors is an increasingly global problem worldwide, especially among nosocomial bacteria. Staphylococci have become one of the common causes of nosocomialinfections. Multi drug-resistant staphylococci pose a growing problem for human health.
ObjectiveThis study was carried out to evaluate the association between the antibiotic susceptibility patterns and the msrA Erythromycin-Resistant gene in staphylococci isolates obtained from various clinical samples of patients.
Methods: A total of 25 staphylococci clinical isolates were collected from the central Health Lab. DNA from each sample was extracted and The gene implicated in resistance to erythromycin (msrA) was amplified using PCR
Background: Hypertension causes changes on the cardiac performance, and this effect is more
profound on the LV where systolic high pressure is present.
Patients and Methods: We studied 30 patients (14 females and 16 males of average age of
54.8±13.5) with hypertension and 20 normal individuals, the control group (age range 45.6±17.8, 11
females and 9 males). Measurements of early filling velocity E, late filling velocity A at atrial
contraction and ejection fraction were taken, also isovolumetric relaxation, and contraction times
and ejection times were taken. MPI myocardial performance index was calculated.
Results: Results shows a significant increase in the isovolumetric relaxation time IRT (30%),were
IRT for
The B-type Raf kinase (BRAF) is a member of RAS\RAF\MEK\ERK pathway and this pathway can lead to increased cellular growth, invasion and metastasis. The mutated BRAF protein activates MAPK signaling pathway, results in abnormal cellular growth, apoptosis resistance, tumor progression and metastasis. Pan-BRAF is one of available BRAF monoclonal antibodies and shared by both the wild and mutant BRAF.BRAF status is mostly determined by DNA sequencing methods. In this investigation we assessed the monoclonal Pan BRAF specific antibody that can identify wild and mutant type proteins together in formalin-fixed paraffin-embedded thyroid tumor tissues by Immunohistochemistry (IHC). Archival thyroid samples from 43 iraqi patients were immunohisto
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Today’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpose, the brain is partitioned into two distinct regions. This is considered to be one of the most important but difficult part of the process of detecting brain tumor. Hence, it is highly necessary that segmentation of the MRI images must be done accurately before asking the computer to do the exact diagnosis. Earlier, a variety of algorithms were developed for segmentation of MRI images by usin
... Show MoreConsider a simple graph on vertices and edges together with a total labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say defined by for all where Also, the value is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by and is the least for which G admits edge irregular h-labeling. In this article, for some common graph families are examined. In addition, an open problem is solved affirmatively.