Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
The formal diversity in designs is achieved by creating shapes and lines with a distinct movement pattern, which are preceded by mental processes. The greatest source of diversity in design in general and industrial design in particular is the creation of multiple directions for the completion of designs and the diversification of intellectual proposals for the design idea. The human activity that takes place around us in various fields of life takes place due to the diversity of movement in the form of the design product and its effectiveness through the dynamic diversity in the form, which differs in the methods of designing and showing it. He invents material value as a distinct artistic product that he owns A specific form or system
... Show MoreThe research aims to estimate missing values using covariance analysis method Coons way to the variable response or dependent variable that represents the main character studied in a type of multi-factor designs experiments called split block-design (SBED) so as to increase the accuracy of the analysis results and the accuracy of statistical tests based on this type of designs. as it was noted in the theoretical aspect to the design of dissident sectors and statistical analysis have to analyze the variation in the experience of experiment )SBED) and the use of covariance way coons analysis according to two methods to estimate the missing value, either in the practical side of it has been implemented field experiment wheat crop in
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show Moreان الهدف من البحث الحالي هو تقويم كتاب الفيزياء للصف الرابع العلمي وفق معايير تصميم وانتاج الانفوجرافيك ومن اجل تحقيق هذا الهدف تم اختيار المنهج الوصفي(تحليل المحتوى) وحدد مجتمع البحث بكتاب الفيزياء للمرحلة الاعدادية الرابع العلمي, المقررة للعام الدراسي 2020-2019 ـ اما عينة البحث فكانت جميع الرسوم والاشكال والمخططات المتضمنة في هذا الكتاب. تم اعداد اداة التحليل المتمثلة بقائمة معايير تصميم وانتاج الانفوجرافيك
... Show Moreان الهدف من هذا البحث هو تحليل كتاب الفيزياء للصف الخامس العلمي للمرحلة الاعدادية في ضوء معايير تصميم وانتاج الانفوجرافيك. ويتم التحقق من هدف البحث من خلال الاجابة عن الاسئلة الاتية: ما هي المعايير التي يمكن في ضوئها تقويم كتاب الفيزياءلصف الخامس العلمي؟ ما النسبة الواجب توافرها لمعايير تصميم وانتاج الانفوجرافيك في كتاب الفيزياء لصف الخامس العلمي؟ ما مدى توفر معايير تصميم وانتاج الانفوجرافيك في كتاب الفيزي
... Show MoreIn this study, the researcher aims to analyze the content of the physics textbook for the 3rd intermediate grade according to the criteria for designing and producing infographics, and the research community consists of the content of the physics textbook for the 3rd intermediate grade intermediate grade for the academic year 2021-2022. The researcher adopted the analysis instruments with a number of the criteria for designing and producing infographics. The results revealed randomness in the percentage of the criteria included in the content of the physics textbook for the 3rd intermediate grade, and they are not compatible with the proposed criteria by the experts also.
The study included selection six species of the fungi related to Pleurotus genus were evaluated for their ability to production of Pleurotin, one of them, Pleurotus ostreatus (P.11) was isolated and identified in the present study. Pleurotin was extracted with screening by Thin Layer Chromatography (TLC) and quantification High Performance Liquid Chromatography (HPLC). Cytotoxicity of Pleurotin extracted from P. ostreatus (P.11) grown in different sugar sources (galactose, mannitol, sucrose, dextrose and lactose) liquid media was test against three selected cancer cell lines, CaSki, MCF-7 and A549 addition to Human Non Cancer Fibroblast Cell Line (MRC-5). Pleurotin of P. ostreatus (P.11) grown in galactose induced the significant highest
... Show More