With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIron–phthalocyanine (FePc) organic photoconductive detector was fabricated using pulsed laser deposition (PLD) technique to work in ultraviolet (UV) and visible regions. The organic semiconductor material (iron phthalocyanine) was deposited on n-type silicon wafer (Si) substrates at different thicknesses (100, 200 and 300) nm. FePc organic photoconductive detector has been improved by two methods: the first is to manufacture the detector on PSi substrates, and the second is by coating the detector with polyamide–nylon polymer to enhance the photoconductivity of the FePc detector. The current–voltage (I–V) characteristics, responsivity, photocurrent gain, response time and the quantum efficiency of the fabricated photoconduc
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreBackground Direct-acting antivirals (DAAs) combination therapies from various mechanisms of action and families have been revolutionized the management landscape of chronic hepatitis C virus (HCV). Ombitasvir, paritaprevir with ritonavir (OBV/PTV/r) ± ribavirin (RBV) is approved to treat HCV genotype 4 (GT4) infection. Here, our objective was to delineate the efficacy and safety of OBV/PTV/r plus RBV in treating of Egyptian naïve patients infected with HCV GT4.
Methods a cohort of 100 Egyptian patients infected with HCV GT4 was allocated and administered orally OBV/PTV/r with RBV. The primary endpoint of our study was a sustained virological response (HCV RNA < 12 IU/mL) 12 weeks after the c
... Show MoreThe research aims to determine the role of green human resource management dimensions of (employment Green, training and development, green, performance evaluation Green, compensation and green bonuses) in the performance leadership of the organization dimensions of (advance planning, efficiency, effectiveness, index pioneering, renovation and modernization), Search of paramount importance because it addresses an important and modern issue in performance leadership, namely green management of human resources, aware of the importance of the subject and expected results of the company under study, an analysis of the data obtained through field visits in
... Show MoreBackground: C-reactive protein (CRP) is an acute phase protein that its plasma levels increase after trauma or surgery so it is used as an indicator for the level of inflammation after surgery. The objective of this study is to investigate pre- and post-operative levels of CRP in three types of oral surgical interventions (Apicoectomy, Impaction, and Impacted teeth exposure). Materials and Methods: A total number of (48) healthy individuals aged (20-60) years who needed oral surgical intervention for either (removal of impacted third molars, exposure of an impacted canine, or Apicoectomy). A 4ml venous blood was obtained from each patient at two occasions (pre-operatively at the day of operation and post-operatively after 48 hours), then ce
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreInformation processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (
... Show More