Been Antkhav three isolates of soil classified as follows: Bacillus G3 consists of spores, G12, G27 led Pal NTG treatment to kill part of the cells of the three isolates varying degrees treatment also led to mutations urged resistance to streptomycin and rifampicin and double mutations
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThe developing countries can be distinguished by spatial disparities and by this a wide gap between urban and rural settlements were produced as well as the appearance of primate cities. The effect of spatial development as a dynamic and continuous process can be perceived in the state of population distribution inside settlements inter and intra regions as well as the hierarchy of urban settlements according to time series. The research proved that the improvement judgment of the structure of the urban system using Gene factor is not accurate because it cannot be accounted for the internal components of the system which make a contrariety between the whole judgment (country) and partial components (Provinces including Sulaimaniy
... Show MoreThis study aims to study the inherited occupations which are considered to be a cultural, civilized and social legacy that effected by the Prevailing social and economic circumstances in the Iraqi society .
The study aimed to achieve several goals, including:
Identify the relationship between the urbanization and inherited occupations in the old city Al-Karkh.
Identify the relationship between the ecological construction and inherited occupations in the old city Al-Karkh.
Recognize the factors and motives inherited occupations in the study area .Identify the role of inherited occupations in promoting opportunities cohesion of the family system in the study area.
The field of the study had concentrated on a sample of famili
In this research a recent developed practical modeling technique is applied for the glucose regulation system identification. By using this technique a set of mathematical models is obtained instead of single one to compensate for the loss of information caused by the optimization technique in curve fitting algorithms, the diversity of members inside the single set is interpreted in term of restricted range of its parameters, also a diagnosis criteria is developed for detecting any disorder in the glucose regulation system by investigating the influence of variation of the parameters on the response of the system, this technique is applied in this research practically for 20 cases with association of National Center for
... Show MoreIn this paper thermo-hydrodynamic characteristics were investigated experimentally for a new type shell-helical coiled tube heat exchanger used as a storage tank of closed loop solar water heater system. Triple concentric helical coils were made of copper tubes of (12.5mm OD and 10mm ID) with coils diameter of (207, 152.2, 97mm) for outer, middle and inner coils respectively. The experiments were carried out during a clear sky days of (March and April 2012). The parameters studied in this work are: history of average temperature of shell side of the storage tank, collector heat gain, heat rejected from coils to shell side of the storage tank, collector efficiency, thermal effectiveness of the heat exchanger (storage tank), and pressure d
... Show MoreAbstract
The present investigation aimed to formulate a liquid self-microemulsifying drug delivery system (SMEDDS) of tacrolimus to enhance its oral bioavailability by improving its dispersibility and dissolution rate. Four liquid SMEDDS were prepared using maisine CC as oil phase, labrasol ALF as surfactant and transcutol HP as co-surfactant based on the solubility studies of tacrolimus in these components. The phase behavior of the components and the area of microemulsion were evaluated using pseudoternary phase diagrams. The formulations were also assessed for thermodynamic stability, robustness to dilution, self-emulsification time, drug content, globule size and polydispersity index. The prepared SMEDDS formulations exhibi
... Show MoreBackground: Acute appendicitis is the most common abdominal surgical emergency. The diagnosis of this condition is still essentially clinical and there is difficulty in the clinical diagnosis, especially among elderly, children and patients with a typical presentation, so early and accurate diagnosis of acute appendicitis is important to avoid its complications.Objectives: To evaluate the degree of accuracy of Alvarado scoring system in the diagnosis of acute appendicitis.Method: Two hundred patients were admitted to the Alkindy Teaching Hospital from January 2011 to april 2014- presented with symptoms and signs suggestive of acute appendicitis. After examination and investigations all patients were given a score according to Alvarado sc
... Show More