Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Eleven yoghurt samples were collected from local markets in Baghdad to isolate Lactobacillus buchneri. Only 3 isolates of L. buchneri were found and the isolate No. 3 was the most producer of bacteriocin. Bacteriocin was adsorbed 100% onto silicic acid at pH 6.0-7.0. Below or above these pH values, adsorption was decreased, ranging between 35 and 90%. Therefore, pH 6.0 was used for the purification procedure. The purification procedure including silicic acid adsorption/desorption and cation-exchange chromatography (CEC) resulted in a 11.11 fold increase in the final specific activity of pure bacteriocin (1176.47 Au/mg) compared to the culture supernatant which was 32.64 Au/mg. The molecular weight was determined to be about 3.4 kDa. The bac
... Show MoreRealizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized
... Show MoreThe media plays an important role in a number of functions performed by them. Press is one of those media which had and still have a clear role in addressing the various issues, topics, and events. Journalism is no longer as expressed by owners of the liberal theory – it seeks to raise the instincts – but it began to excite the minds of readers to meet their needs. At the same time, it does not neglect the search for the truth and work to deliver it to readers. Some have identified a set of tasks carried out by the press including the interest in public affairs, the needs of the community, work to provide happiness, what is beneficial and useful and combat the negative phenomenon and to address the deviations facing society. The comi
... Show MoreChemical pesticides have an impact on other living organisms in addition to their intended target organisms. Any chemical pesticide is therefore made safe for use by examining its biological characteristics and side effects. The present study was aimed at determining the resistance efficiency of six bacterial isolates obtained from malathion-contaminated soils. Bacteria were isolated from soil samples collected in Adhamiya, Baghdad, Iraq. Biochemical tests and VITEK 2 compact equipment were used to identify the bacterial isolates. Primary and secondary screening tests were conducted on the bacterial isolates for resistance against malathion pesticides. The optimal bacterial growth conditions were determined in malathion-contaminated media.
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show Moreلقد تسبب انتشار الإرهاب في العالم وكذلك الحروب الأهلية والصراعات في أوائل القرن الحادي والعشرين في جميع أنحاء العالم في الكثير من الأضرار وخلفت ضحايا جسيمة. أدت الهجمات الإرهابية على النساء، مثل اختطاف بوكو حرام لأكثر من 270 تلميذة في نيجيريا وتقارير عن انتشار الاغتصاب والاعتداء الجنسي في المناطق التي مزقتها الحرب، إلى إنتاج العديد من العروض المسرحية في الولايات المتحدة التي تصور خواص الجناة وكذلك الضحا
... Show MoreBackground: A successful endodontic treatment is aimed at the sterilization of the entire pulp space. The use of extracts from Rhamnus prinoides as a novel irrigating material for root canal has not been studied . Hence, the antimicrobial efficacy of the alcoholic extract of Rhamnus prinoides as an irrigation material against E. faecalis was evaluated in comparison with the 2.5% sodium hypochlorite (NaOCL) solution used for root canals of permanent teeth. Methods: A total of 30 single-rooted human permanent teeth were thoroughly cleaned, shaped, and disinfected. Then, each tooth was subjected to a two-week infection with Enterococcus faecalis at 37 °C . Afterward, the samples were divided into three groups (10 teeth per group): 0.9
... Show More