Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
One of the main techniques to achieve phase behavior calculations of reservoir fluids is the equation of state. Soave - Redlich - Kwong equation of state can then be used to predict the phase behavior of the petroleum fluids by treating it as a multi-components system of pure and pseudo-components. The use of Soave – Redlich – Kwon equation of state is popular in the calculations of petroleum engineering therefore many researchers used it to perform phase behavior analysis for reservoir fluids (Wang and Orr (2000), Ertekin and Obut (2003), Hasan (2004) and Haghtalab (2011))
This paper presents a new flash model for reservoir fluids in gas – oil se
Abstract
It considers training programs is an important process contributing to provide employees with the skills required to do their jobs efficiently and effectively, so it should be concerned with and the focus of all government our organizations, and perhaps the most important reasons that I was invited to select the subject (evaluation of training programs directed toward the diagnosis of the phenomenon of financial and administrative corruption) It is the importance of those programs working in the regulatory institutions General and the Office of Inspector General of Finance and the Ministry particularly for employees because of their role in the development of their skills and their experience and their beha
... Show More
There is no doubt that the achievement of the manuscripts of There is no doubt various of situations for performing a duty , The diversity of stimuli in humans with sensory, unconscious and instinct sensitive systems. Which leads to a diversity of feelings, sensations, emotions and feelings, This therefore requires different types of function linguistic structures indication , Of that linguistic potential that God willing to be unique, In the function of discharging and venting those feelings and emotions that are raised by its various stimuli, which are only needs and psychological and biological purposes require verification and access and gain it. S
... Show MoreHeat treatment by solid solution method in the ?+? phase region was used at 970°C for Ti-5Al-2.5Fe alloy. The specimens cooled under different cooling media [water quenched (WQ), air cooled (AC) and furnace cooled (FC)], and subsequently aged at 550°C for 4 hours. Five specimens from each treatment were immersed in simulated body fluid SBF for a period of time (3 months). The dependence of corrosion rate on compositional variation in the phases resulted from various type of cooling rates are discussed based on immersion tests. The EDXA results show the precipitation of phosphate and calcium compounds on the alloy after 3 months of immersion in blood plasma solution forming a bone-like apatite, which enhanced the alloy biocompatibility ma
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreObjective: Evaluation of women's knowledge about risk factors and early detection of breast cancer at
Ibn Rushd college of education in Baghdad University.
Methodology: The study sample included (184) women in the Ibn Rushd College / University of
Baghdad, whose age ranged between (17-58) years. Data were collected through a structured
questionnaire prepared by the National Cancer Research Center which were answered during a scientific
symposium about breast cancer. The score was calculated by correcting the results of the answer, giving
one score for each correct answer and then estimating the level of knowledge and inputting all data in a
statistical program.
Results: The results showed limited level of women's
This work is divided into two parts first part study electronic structure and vibration properties of the Iobenguane material that is used in CT scan imaging. Iobenguane, or MIBG, is an aralkylguanidine analog of the adrenergic neurotransmitter norepinephrine and a radiopharmaceutical. It acts as a blocking agent for adrenergic neurons. When radiolabeled, it can be used in nuclear medicinal diagnostic techniques as well as in neuroendocrine antineoplastic treatments. The aim of this work is to provide general information about Iobenguane that can be used to obtain results to diagnose the diseases. The second part study image processing techniques, the CT scan image is transformed to frequency domain using the LWT. Two methods of contrast
... Show MoreIn recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show MoreFace Detection by skin color in the field of computer vision is a difficult challenge. Detection of human skin focuses on the identification of pixels and skin-colored areas of a given picture. Since skin colors are invariant in orientation and size and rapid to process, they are used in the identification of human skin. In addition features like ethnicity, sensor, optics and lighting conditions that are different are sensitive factors for the relationship between surface colors and lighting (an issue that is strongly related to color stability). This paper presents a new technique for face detection based on human skin. Three methods of Probability Density Function (PDF) were applied to detect the face by skin color; these ar
... Show MoreRemote sensing and GIS applications (Geoinformatics tools) involve a wide range of techniques for providing a solution for future water resources management and offer an excellent means to improve knowledge of sustainable planning. Al-Razzaza is the second largest lake in Iraq; it is a common source of fishery fortune and floodwater reservoir in southwestern Iraq. In recent years, the lake faced a noticeable amount of desiccation, which is considered a threat to the biodiversity and wildlife of the lake. The study aimed to detect the Lake's spatiotemporal changes from 1988 to 2018. Multi satellite-derived indices were investigated for the extracting of the lake water body. Results showed that the lake volume decrea
... Show More