The main target of the current study is to investigate the microbial content and mineral contaminants of the imported meat available in the city of Baghdad and to ensure that it is free from harmful bacteria, safe and it compliances with the Iraqi standard specifications. Some trace mineral elements such as (Iron, Copper, Lead, and Cadmium) were also estimated, where 10 brands of these meats were collected. Bacteriological tests were carried out which included (total bacterial count,
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreTwo years field experiment was carried out at Agricultural Fields, College of Agriculture, Baghdad University, Al-Jadriya during 2014-2015 and 2015-2016 to determine the effect of salinity of irrigation water on growth and grain yield of three oat cultivars. The experiments were laid out according to randomized complete blocks design having split plot arrangements with two factors; first factor included three oat cultivars (Shifaa, Hamel and Pimula) while the second factor included three levels of salinity of irrigation water (3, 6 and 9 dS.m-1 ) in addition to the control (river water with salinity level of 1.164 dS.m-1 ) with three replicates. Results revealed a significant effect of salinity of irrigation water on all studied traits. Mea
... Show MoreThe accuracy of the skillful performance of the front and back dimensions of badminton in volleyball, occurs through the investment of complex exercises (physical skills) in a single performance and its characteristics that give the correct movement behavior and speed to the accuracy of the performance of the strokes as well as the identification of changes in some physiological indicators of By using these compound exercises. The research problem lies: I found a weakness in the accuracy of the performance of the front and back dimensions strike and diagnosed this through the tests that it conducted on the players to identify and know the problem, and attributed this weakness to a weakness in the necessary physical and skill abilities and t
... Show MoreWith the aim of developing potential antimicrobials, a series of novel Ciprofloxacin methylene isatin derivatives incorporating different aromatic aldehydes were synthesized and characterized by FTIR, 1H NMR, Mass spectroscopy and bases of elemental analysis. In addition, the in vitro antibacterial and antifungal properties were tested against some human pathogenic microorganisms by employing the disc diffusion technique. A majority of compounds were showing activity against several of the microorganisms. The relationship between the functional group variation and the biological activity of the evaluated compounds is discussed. From comparisons of the compounds, 3c was determined to be the most active compound.
Pregnancy and delivery are physiological conditions that are marked by abrupt alterations to hormones, immunological and molecular characters. The current study aimed to evaluate oxytocin (OT), prolactin (PRL), cortisol and insulin growth factor-2 (IGF-2) levels as physiological biomarkers; programmed cell death protein-1 (PD-1), programmed cell death ligand-1 (PD-L1),interleukin-6 (IL-6) as immunological biomarkers, and single nucleotide polymorphisms (SNPs; rs53576 and rs2254298) of oxytocin receptor gene OXTR as molecular factors in samples of Iraqi women undergoing caesarean section (CS) and normal delivery (ND). Blood samples were collected from 96 pregnant women at term with ages ranging between 16-43 years. Regarding
... Show More