With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Background: Klebsiella pneumoniae were considered as normal flora of skin, and intestine. It can cause damage to human lungs; the danger of this bacterium is related to exposure to the hospital surroundings. materials and methods: the detection of Klebsiella pneumoniae on morphological and biochemical tests and then assured with VITEK 2 system. Resistance to antibiotics was determined by Kirby-Baeur method. And genotyping of IMP-1 in isolates was done by PCR technique, then biofilm formation was identified by Micro titer plate method. Results: The present study included a collecting of 50 specimens from different clinical specimens, (blood 40%, urine 30%, sputum 20%, wound infection 10%); 10 isolates were identified as K
... Show MoreTuberculosis status as the second leading causes of significant morbidity and mortality from an infectious disease worldwide, after human immunodeficiency virus (HIV). Sample collection was conducted at the Institute of Chest and Respiratory Diseases/Baghdad Medical City in Baghdad. The collection interval was from August to October 2014, 629 suspected TB patients were examined during this period. The results revealed among total 629 specimens, 56 (8.9%) of the specimens were positive by direct examination and 573 (91.1%) negative specimens by smear microscopy. Fifty six DNA samples were extracted from positive ZN smears of sputum specimens and 40 samples from healthy persons (as control) were subjected to molecular diagnosis by real tim
... Show MoreThe electronic payment systems are considered the most important infrastructure for the work of banks, particularly after a steady and remarkable development in information and communication technology, Which created the reality of the work of the infrastructure for these systems and these systems also become one of the most important components of infrastructure for the work of banks, cause it is one of the most important channels through which the transfer of cash, financial instruments between financial institutions in general and banking in particular.
In order to achieve the objectives of the research, the most important to identify the concept of electronic payment systems, and its divisions, and th
... Show MoreAutorías: Nadeema Badr Mohammed, Missaa Nadem, Huda Badwe Shbeeb, Iqbal Abdul Hussein Neamah, Najlaa Abbas AL Zuhairi, Nihad Mohammed Alwan. Localización: Retos: nuevas tendencias en educación física, deporte y recreación. Nº. 63, 2025. Artículo de Revista en Dialnet.
Air pollution refers to the release of pollutants into the air that are detrimental to human health and the planet as a whole.In this research, the air pollutants concentration measurements such as Total Suspended Particles(TSP), Carbon Monoxides(CO),Carbon Dioxide (CO2) and meteorological parameters including temperature (T), relative humidity (RH) and wind speed & direction were conducted in Baghdad city by several stations measuring numbered (22) stations located in different regions, and were classified into (industrial, commercial and residential) stations. Using Arc-GIS program ( spatial Analyses), different maps have been prepared for the distribution of different pollutant
Background: Many studies have been conducted to evaluate the effect of using a hot material in the root canal and its potential for causing damage to the tooth supporting structure. Materials and methods: thirty permanent premolars were obturated with thermoplasticized Gutta-Percha using three different obturation techniques: soft core, Thermafil, and obtura to evaluate the rise in temperature on the root surface using a multipurpose digital thermometer. Results: temperature increases was significantly greater for Obtura versus Soft core (p<0.003), not significant for Thermafil versus Soft core (p<0.087), and Thermafil versus Obtura (p<0.125). Conclusions: temperatures rise on the root surface were below the critical level and, therefore, s
... Show MoreWere arranged this study on two sections, which included first section comparison between markets proposed through the use of transport models and the use of the program QSB for less costs , dependant the optimal solution to chose the suggested market to locate new market that achieve lower costs in the transport of goods from factories (ALRasheed ,ALAmeen , AlMaamun ) to points of sale, but the second part has included comparison of all methods of transport (The least cost method ,Vogels method , Results Approximations method , Total method) depending on the agenda of transport, which includes the market proposed selected from the first section and choose the way in which check the solution first best suited in terms
... Show MoreComposite steel-concrete sections have a broad benefit through increasing structural strength as well as minimizing the self-loads. All past researches were concerned with pre-installed shear connectors (PRSC) in the manufacturing of composite sections. A new fabrication technique for steel-concrete-steel composite sections were presented in the current study by the post-installation shear connectors (POSC) passed-through an embedded polymerizing vinyl chloride (PVC) pipes. The performance of normal strength concrete prisms with a specified strength of 32 MPa connected to square steel tubes (SST) was investigated. Six specimens were fabricated in both methodologies, PRSC and POSC were experimentally tested by Push-out test. The spac
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreAutomatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t
... Show More