With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).
Today, there are large amounts of geospatial data available on the web such as Google Map (GM), OpenStreetMap (OSM), Flickr service, Wikimapia and others. All of these services called open source geospatial data. Geospatial data from different sources often has variable accuracy due to different data collection methods; therefore data accuracy may not meet the user requirement in varying organization. This paper aims to develop a tool to assess the quality of GM data by comparing it with formal data such as spatial data from Mayoralty of Baghdad (MB). This tool developed by Visual Basic language, and validated on two different study areas in Baghdad / Iraq (Al-Karada and Al- Kadhumiyah). The positional accuracy was asses
... Show MoreThe purpose of the study is the city of Baghdad, the capital of Iraq, was chosen to study the spectral reflection of the land cover and to determine the changes taking place in the areas of the main features of the city using the temporal resolution of multispectral bands of the satellite Landsat 5 and 8 for MSS and OLI sensors respectively belonging to NASA and for the period 1999-2021, and calculating the increase and decrease in the basic features of Baghdad. The main conclusions of the study were, This study from 1999 to 2021 and in two different seasons: the Spring of the growing season and Summer the dry season. When using the supervised classification method to determine the differences, the results showed remarkable changes. Where h
... Show MoreSurvivin, a member of inhibitor of apoptosis family is increasingly used as a target for cancer therapy design because it has a key role in cell growth and inhibition of cell apoptosis. Also it can be used as a biomarker for targeting cancer because it is found in almost all cancer but not normal cells. Our strategy was to design (computationally) a molecule to be used as survivin inhibitor. This molecule was named lead10 and was used furthermore to find (virtually) existing drugs with a good survivin inhibition activity.
It is known that energy subiect has ocuppied a lot of scientests minds about
how to treat the traditional energy and the renewing energy . we know that
most traditional energy coal , oil , Natural gas, neuclear fuel , are limited
guantiy and alsow subjected to be ended .Statics studies refer to reserve
of oil in world will exhausted btween ( 2075- 2100) and alsow cosl too .
While neuclear fuerl which the world seek today through explod the uranium
atom ( 233) the therum atom (239) and neuclear mxied through ruemlear
mixing , These energy have effect on environment and humanity speciaty if
they are used in militery purposes .
For all theses scientests srarch for resources of renewing enery through
researches
Checkpoint inhibitors are a type of immune therapy used to treat different types of cancers. These drugs block different checkpoint proteins, for example, CTLA-4, PD-1, and PD-L1 inhibitors.
They block proteins that stop the immune system from attacking the cancer cells. Checkpoints are also described as a type of monoclonal antibody that antagonizes binding between B7 to CTLA-4 and PD-L1 to PD-1.
Immune checkpoint inhibitors are used to treat BARCA mutated triple-negative breast cancer (TNBCS) in patients who do not respond to chemotherapy, and also in the treatment of highly mutated and solid tumors such as brain tumors, liver, and pancreatic cancers.
Immune checkpoint inhibitors exhibit an effect on solid tumo
... Show MoreThere are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com
... Show MoreThe aims of this study are to explore the commercial artifacts in the following three kinds of vegetables oils, Nigella Sativa, Trigonella foenum-graecum Linn,and Zingiber officinale. These oils have been very popular medicinal plants which are commonly used in traditional medicine .These commercial oils have been compared with the extracts of these plants.
The physical properties of extracts and commercial oils of these plants have been stuied. We observed that the refractive index of the plants matches and non-significant, while specific gravity of Nigella Sativa has similar specific gravity in both extracts and commercial oil in contrast with Trigonella foenum Linn,and Zingiber officinale and we found significant difference (P<
The UV−VIS absorption spectroscopy technique was used to study the formation of a new complex of charge transfer (CT) between bioactive organic molecules as (Nystatin) containing both a π-electrons from a conjugated system and lone-pair of electrons (amine) with Tetrachloro-1,4 benzoquinone (TCBQ) as a π-acceptor in which the transferred electron goes into its vacant anti-bonding molecular orbitals. The Tyrian purple-colored complex formed was quantitatively measured at 544 nm. This complex shows obeying Beer's law within the concentration range of (10-90) μg.ml-1The stoichiometry of the formed complex between the (Nys.) and (TCBQ) was found 1:2 as evaluated by continuous variation (Job's method) and mole ratio method The value of mola
... Show MoreThis research aims to identify the impact of the reciprocal reading strategy on developing the innovative reading skills of fifth-grade secondary school students/ scientific branch. To achieve the goal of the research, an achievement test to measure the academic achievement of fifth-grade secondary school students in Arabic language grammar was prepared, a sample of (60) female students from the secondary school of Al- Bawaba Al-Sharkey for Girls in Baghdad were chosen for the academic year (2019-2020). For the purpose of applying the experiment, the test was applied on a pilot sample consisting of (30) students from the same research community. The researcher herself had taught the three
... Show MoreIn the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show More