Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Antibacterial activity of CNSs against Staphylococcus aureus and Escherichia coli was estimated. Higher inhibition zone of 18 mm and 20 mm were observed against S. aureus and E.coli, respectively, at a concentration of 2 mg/ml of carbon nanosphere after 24 hrs of incubation at 37 ºC. In vitro cytotoxicity experiment was performed on two parasite strains of Leishmania donovani and Leishmania tropica by using MTT assay. L. donovani revealed more sensitiv to the CNSs than L. tropica. An intermediate level of cytotoxicity of 51.31 % was observed when 2.4 mg/ml of CNSs was incubated with L. donovani, while weak cytotoxicity of 37.20 % was shown when the
... Show MoreThis research included the preparation of 2-mercaptobenzoxazole (N1) by the reaction of ortho-aminophenol with carbon disulfide in an alcoholic potassium hydroxide solution. The 2-mercapto benzoxazole (N1) was then treated with hydrazine to obtain the 2-hydrazino benzoxazole (N2). A number of hydrazones (N3-N5) were prepared through the reaction of N2 with different benzaldehydes. The compound (N6) was also prepared whereby the ring closing of hydrazone (N3) using chloroacetylchloride, while the compound (N7) was prepared by treating 2-hydrazino benzoxazole with acetylacetone. When the compound (N1) was treated with formaldehyde, it afforded the compound (N8). Also, the N9 was obtained from the reaction of N1 with chloroacetic acid in th
... Show MoreHusbands’ violence towards their wives is one of the greatly important issues in social sciences. Accordingly, the current study aims at determining the levels of violence practiced by husbands towards their wives to propose a professional program from the perspective of the general practice of social work to overcome such a phenomenon. The study is descriptive in nature, where the researcher has used a comprehensive social survey method. To achieve the goal of the study, the researcher has prepared a questionnaire that consisted of two parts. The first part contains the primary data of the two sections, and the second contains (38) phrases distributed over four axes to measure the levels and types of violence among the sample’s memb
... Show MoreIraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall. This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of indivi
... Show MoreInformation security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
Radiation is a form of energy, its emitted either in the form of particles such as α-particles and β-particles (beta particles including the electron and the positron) or waves such as sunlight, X-rays and γ-rays. Radiation found everywhere around us and it comes from many different sources naturally or man-made sources. In this study a questionnaire was distributed to people working in the field of X-rays that used for a medical imaging (X-ray and CT-scan) to evaluate the extent of awareness and knowledge in estimate the damage of ionizing radiation as a result of wrong use. The questionnaire was distributed to medical clinics in Al-Harithiya in Baghdad, which it’s considered as