With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vectors to determine the sub-class of each attack type are selected. Features are evaluated to measure its discrimination ability among classes. K-Means clustering algorithm is then used to cluster each class into two clusters. SFFS and ANN are used in hierarchical basis to select the relevant features and classify the query behavior to proper intrusion type. Experimental evaluation on NSL-KDD, a filtered version of the original KDD99 has shown that the proposed IDS can achieve good performance in terms of intrusions detection and recognition.
The present study was conducted as atrial to treat secondary hydatidosis in white mice of species Mus musculus. (Balb/c strain), experimentally infected with secondary hydatid cysts of sheep origin. The immunization process was carried by using CF/PS antigen which consist hydatid cyst fluid (CF) antigen, and protoscolices (PS) antigen mixed together and by using two concentrations 7.5, 15 mg/ml. Then derivatives of Benzimidazole, Mebendazole (M) and drugs Albendazole (A) were used 10 and 40 μm/gm body weight respectively. The mixture of drugs was used one week after challenged dose. Criteria taken into consideration to define the activity of the immunization and chemotherapy in this study were reduction in the numeral of cysts, the coeffic
... Show MoreCOVID-19 is a unique viral infectious illness that causes a variety of symptoms and health hazards, particularly to the respiratory system and has been declared a worldwide pandemic. The disease is characterized by a cytokine release in severe conditions. Interleukin-6 (IL-6), a proinflammatory cytokine, mediates an important immunomodulatory process. Also, vitamin D was identified to have a role in the innate immunity of individuals. Our study was designed to find the role of IL-6 and vitamin D in COVID-19 patients, as well as, to see whether there is a link between vitamin D deficiency and cytokine syndrome development. The study included 90 COVID-19 patients and 30 control people from Baghdad, Iraq. The age of the participants was non-s
... Show MorePorous silicon was prepared by using electrochemical etching process. The structure, electrical, and photoelectrical properties had been performed. Scanning Electron Microscope (SEM) observations of porous silicon layers were obtained before and after rapid thermal oxidation process. The rapid thermal oxidation process did not modify the morphology of porous layers. The unique observation was the pore size decreased after oxidation; pore number and shape were conserved. The wall size which separated between pore was increased after oxidation and that effected on charge transport mechanism of PS
Isocratic high performance liquid chromatography on reversed phase a (150x 4.6 mm I.D), 5 ?m ?-Bondapak RP-8 column (with acidic mobile phase allow the separation of doxcycycline hydrochloride with low detection limit of 0.2 µg/ml detected by UV set at 226 nm. The method was validated for Doxycycline between 0.156- to 5 µg/ml. The concentration of doxycycline was assessed in two single dose randomized crossover studies with intervals of one week between two period. In sera of 20 adults healthy male volunteers with average age of (42 + 10) year, body weight 48-85 kg, body height of (160-185cm) after a single dose of doxycycline hydrochoride 100 mg in form of capsules were orally administrated for both formulations. The blood sa
... Show MoreThe thermal properties (thermal transfer and thermal expansion coefficient) of the enhanced epoxy resin (MWCNT / x-TiO2) were studied by weight ratios with the values (0%, 3%, 5%, 7% and 10%) and a constant ratio of 3% of MWCNT. The ultrasonic technology was used to prepare the neat and composites which were then poured into Teflon molds according to standard conditions. Thermo-analyzer sensor technology was used to measure thermal transfer (thermal conductivity, thermal flow, thermal diffusion, thermal energy and heat resistance). The thermal conductivity, flow, and thermal conductivity values were increased sequentially by increasing the weight ratio of the filler while the results of stored energy values an
... Show MoreFaith is a feature of the Mesopotamian population, since the ancient Mesopotamian was a believer and obedient to his God in any case, and this encouraged the emergence of some of the phenomena interpreted by historians as an integral part of the civilization and ancient history of this country, and these phenomena are the phenomena of the deification of kings for themselves, The first phenomenon was a personal endeavor for the uniqueness of power, sometimes to correct some mistakes in societies to balance the state, and civil rule is independent of religious rule, and the second was the result of divination and predictions of omen, in the case of any bad harbinger of the king, such as the occurrence of eclipse To the sun or a lunar eclip
... Show MoreDBN Rashid, Astra Salvensis, 2018 - Cited by 1
يهدف البحث الحالي الى استكشاف علاقات التفاعل والتاثير بين الاحتكام للمكانة والتوجه للفردية– الجماعية والدمج التنظيمي مستنداً على مزج اختلاف القيم الشخصية مع افكار نظرية الهوية الاجتماعية لبلورة نموذج البحث. وفي ضوء هذا تم صياغة عدد من الفرضيات التي توضح علاقات التفاعل ما بين ابعاد الاحتكام للمكانة والتوجه للفردية– الجماعية للتنبؤ بوجود الدمج التنظيمي. جمعت البيانات باستخدام استمارة الاستبيان ووزع
... Show MoreMultimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro
... Show More