With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).
This study tests the effect of a large number of independent variables that control the growth of the total productivity, which amounted to 112 variables, gathered from what is mentioned in the specialized theoretical and applied literature. The data for these variables were taken from global reports of sound international organizations and reliable databases covering the period 1991-2016. The data of the dependent variable, the growth of the total factor productivity, were taken from the database of the world development indicators. The study covered 61 countries for which data were available. The study included three regression models to explain
... Show MoreThe present study aims to detect CTX-M-type ESBL from Escherichia coli clinical isolates and to analyze their antibotic susceptibility patterns. One hundred of E. coli isolates were collected from different clinical samples from a tertiary hospital. ESBL positivity was determined by the disk diffusion method. PCR used for amplification of CTX-M-type ESBL produced by E. coli. Out of 100 E. coli isolates, twenty-four isolates (24%) were ESBL-producers. E. coli isolated from pus was the most frequent clinical specimen that produced ESBL (41.66%) followed by urine (34.21%), respiratory (22.23%), and blood (19.05%). After PCR amplification of these 24 isolates, 10 (41.66%) isolates were found to possess CTX-M genes. The CTX-M type ESBL
... Show MoreThe current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method). Qualitative and quantitative determinations of epicatechin in two tea samples were investigated. Epicatechin identification was made by utilizing preliminary chemical tests and TLC. This identification was also boosted by HPLC and then quantified epicatechin in all ethyl acetate fractions of two tea samples. This research revealed the existence of epica
... Show MoreIn this work, the detection of zinc (Zn) ions that cause water pollution is studied using the CSNPs- Linker-alkaloids compound that was prepared by linking extracted alkaloids from Iraqi Catharanthus roseus plant with Chitosan nanoparticles (CSNPs) using maleic anhydride. This compound is characterized by an X-ray diffractometer (XRD) which shows that it has an orthorhombic structure with crystallite size in the nano dimension. Zeta Potential results show that the CSNPs-Linker-alkaloids carried a positive charge of 54.4 mV, which means it possesses high stability. The Fourier transform infrared spectroscopy (FTIR) shows a new distinct band at 1708.93 cm-1 due to C=O esterification. Scanning electron microscope (SEM) image
... Show MoreThe study of triples seeks to deal with the comprehensive nature of the Qur’an texts, and the choice fell on the trilogy of great torment, pain, and humiliation in the Noble Qur’an - an objective study, the title of this research, in which I tried to shed light on these terms, and the nuances between them, and in particular torment The eschatological terminology varied, which can be summed up in three terms, namely the great, the painful, and the offensive. The types of torment, the pain is the painful one that is described by the severity of pain and its horror, as for the humiliating punishment, it is that which humiliates the one who has fallen on it, and the diversity of torment is due to the diversity of sins.
The research specified with study the relation between the market share for the sample research banks and the amount of the achieved revenues from the investment, where the dominated belief that there potentiality enhancing the revenue on investment with the increase of the banks shares in their markets after their success in achieving rates of successive growth in their sales of sales and to a suitable achieve market coverage for their products and they have dissemination and suitable promotion activity, the market share represented the competition for the banks, and the markets pay attention to the market share as a strategic objective and to maintain them also increasi
... Show MoreThe aim of the research is to know the effect of financial leverage on the market value of the stock by applying it to a sample of private Iraqi commercial banks listed in the Iraqi Stock Exchange for the period (2010-2019) and to show the extent of that effect, based on the bank’s annual reports for the mentioned period through the use of financial leverage ratios represented b (Equity multiplier, cash balance ratio), its discussion, analysis, description, inferential description, and testing of research hypotheses,
A set of conclusions has been reached, the most important of which are: The research sample banks depend in their financial structures on borrowed funds in a greater proportion than their r
... Show More