With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vectors to determine the sub-class of each attack type are selected. Features are evaluated to measure its discrimination ability among classes. K-Means clustering algorithm is then used to cluster each class into two clusters. SFFS and ANN are used in hierarchical basis to select the relevant features and classify the query behavior to proper intrusion type. Experimental evaluation on NSL-KDD, a filtered version of the original KDD99 has shown that the proposed IDS can achieve good performance in terms of intrusions detection and recognition.
ABSTRACT— In primary teeth, root canal treatment is a time consuming and challenging procedure, particularly during the most important step in endodontic treatment which is the preparation of the canal. Pulpectomy is the treatment of choice in all the necrotic primary teeth. For better treatment protocol, advancing technology brought the rotary system to reduce the manual dexterity and improve the quality of treatment for pulpectomy. This study aimed to compare and assess the efficacy of cleaning and the time required for the instrumentation during the preparation of root canals of the primary molars using the rotary and the manual (conventional) systems. Thirty root canals of primary teeth were selected. These teeth submitted to a
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreIn the current study, remote sensing techniques and geographic information systems were used to detect changes in land use / land cover (LULC) in the city of Al Hillah, central Iraq for the period from 1990 - 2022. Landsat 5 TM and Landsat 8 OLI visualizations, correction and georeferencing of satellite visuals were used. And then make the necessary classifications to show the changes in LULC in the city of Al Hillah. Through the study, the results showed that there is a clear expansion in the urban area from 20.5 km2 in 1990 to about 57 km2 in 2022. On the other hand, the results showed that there is a slight increase in agricultural areas and water. While the arid (empty) area decreased from 168.7 km 2 to 122 km 2 in 2022. Long-term ur
... Show MoreThe di-(2-ethylhexyl) phthalate (DEHP) was extracted using different solvents from plastic blood bag. The extracted product was identified using FT-IR, NMR (1H and 13C), DEPT, COSY, HMBC and HSQC_TOCSY spectrometry. The extracted plasticizer was tested in complex formation with Fe2+ and Cr3+ using UV-visible spectrophotometric method. The migration of the plasticizer from the blood bags to the blood was studied and determined during different storage times depending upon the formation of complexes with Fe2+ and Cr3+, and the change in the concentration of Fe2+ and Cr3+.
Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul
... Show MoreInfertility can be detected when the couples have not completed pregnancy after a year or more of normal coitus. So, in order to treat infertility, there are many supported reproductive techniques are in practice. The success rate of these techniques depends upon the way by which preparation of the paternal semen sample. Over the past 30 years, the manual has been standard as providing global standards and has been used extensively by research and clinical laboratories throughout the world. The spermatozoa of all placental (eutherian) mammals, including humans, are in a protective, no labile formal at ejaculation and are incapable of fertilization even if they are placed in direct contact with an oocyte. Accordingly, they must undergo a sub
... Show MoreStatistical learning theory serves as the foundational bedrock of Machine learning (ML), which in turn represents the backbone of artificial intelligence, ushering in innovative solutions for real-world challenges. Its origins can be linked to the point where statistics and the field of computing meet, evolving into a distinct scientific discipline. Machine learning can be distinguished by its fundamental branches, encompassing supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning. Within this tapestry, supervised learning takes center stage, divided in two fundamental forms: classification and regression. Regression is tailored for continuous outcomes, while classification specializes in c
... Show MoreThe current world seeks to supply the most of the fruits of human knowledge and tries hard to search for the most important scientific facts, programs, means and advanced devices in various fields, including the sports field, and among these means is the use of various and advanced training devices and programs for the purpose of achieving the desired goal, which is to reach the desired level, the basketball game is one of the sports that need high technology in training according to scientifically studied principles because it is one of the games that relate to the abundance of its variables, composition and speed of change, all of which require a technical and high training depth and the players ’possession of different physical charact
... Show MoreCutaneous leishmaniasis is one of endemic diseases in Iraq. It is considered as widely health problem and is an uncontrolled disease. The aim of the study is to identify of Leishmania species that cause skin lesions among patients in Thi-Qar Province, South of Iraq, also to detect some virulence factors of L. tropica. This study includes three local locations, Al-Hussein Teaching, Suq Al-Shyokh General and Al-Shatrah General Hospitals in Province for the period from the beginning of December 2018 to the end of September 2019. The samples were collected from 80 patients suffering from cutaneous leishmaniasis, both genders, different ages, various residence places and single and multiple lesions. Nested-PCR technique was
... Show More