The fluctuations in oil prices in world markets affect the general budget and the trade balance of the rent countries, because oil is a strategic commodity affected by economic and political factors. The fluctuations in oil prices affect the public budgets of the rent countries through the public revenue side of oil revenues. On the other hand, these fluctuations affect the balance of trade through the volume of oil exports, which lead to imbalance of trade surplus or deficit . &nbs
... Show MoreSixty urine samples were collected from women with urinary tract infection in different ages. The aims of this study were determined the dominancy of pathogens isolated from urine of women with UTI and evaluating the antibacterial activity of Rosmarinus officinalis L. essential oil against these pathogenic isolates. Identification of bacteria was done on Chromogenic orientation agar while disc diffusion method was used for determination the sensitivity of bacterial isolates to antibiotics and Agar well diffusion method was used for evaluation the antibacterial effect of Rosemary essential oil on these isolates. The results showed that 50% of women infected with Escherichia coli, it was dominants in ages above 15 years old while Staphyl
... Show MoreSixty urine samples were collected from women with urinary tract infection in different ages. The aims of this study were determined the dominancy of pathogens isolated from urine of women with UTI and evaluating the antibacterial activity of Rosmarinus officinalis L. essential oil against these pathogenic isolates. Identification of bacteria was done on Chromogenic orientation agar while disc diffusion method was used for determination the sensitivity of bacterial isolates to antibiotics and Agar well diffusion method was used for evaluation the antibacterial effect of Rosemary essential oil on these isolates. The results showed that 50% of women infected with Escherichia coli, it was dominants in ages above 15 years old while Staphylococc
... Show MoreIn this study, only four isolates produce CNF1 from 76 isolatesof uropathogenic Escherichia coli.cnf1 gene was detected by using PCR technique, while cytotoxic necrotizing factor 1(CNF1) was determined by Immunoblotting assay.
In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show MoreRecent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)