Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone
... Show MoreTo determine the abilities of salivary E‐cadherin to differentiate between periodontal health and periodontitis and to discriminate grades of periodontitis.
E‐cadherin is the main protein responsible for maintaining the integrity of epithelial‐barrier function. Disintegration of this protein is one of the events associated with the destructive forms of periodontal disease leading to increase concentration of E‐cadherin in the oral biofluids.
A total of 63 patients with periodontitis (case) and 35
Human behavior is one of the topics that has captured the attention of researchers throughout the ages, and motivation is one of the manifestations of this behavior, which indicates the extent of interest in a particular topic and their unwillingness to rush towards a particular topic. The topic of motivation is one of the important topics of interest to the teacher and coach in the field of sports. The aim of this research was identifying the level of motivation for junior students, and the differences in the dimensions of motivation for junior students in squash lessons. We used the descriptive survey method, and the research sample was chosen randomly. Only male of the junior students in the College of Phys
... Show MoreWe studied the relationship between DNA sequencing of interleukin-10 (IL-10) gene promoter for -1082 (A/G) and -592 (A/C) positions with the concentration of IL-10 in blood serum of Iraqi children with type 1 diabetes mellitus (T1D). Fifty blood serum samples collected from children with age ranged between 7-12 years. Thirty-five blood samples collected from patient children with T1D, and compared with 15 healthy children age matched as control sample. The results revealed decreasing in anti-inflammatory IL-10 concentration in T1D patient’s blood serum (0.068 Pg/ml) as compared with the control sample (0.111 Pg/ml). No significant differences were found in interleukin concentration between the studied samples when they analyzed with the M
... Show MoreAbstract
This research aims to design a multi-objective mathematical model to assess the project quality based on three criteria: time, cost and performance. This model has been applied in one of the major projects formations of the Saad Public Company which enables to completion the project on time at an additional cost that would be within the estimated budget with a satisfactory level of the performance which match with consumer requirements. The problem of research is to ensure that the project is completed with the required quality Is subject to constraints, such as time, cost and performance, so this requires prioritizing multiple goals. The project
... Show MoreRecently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical.
... Show MoreA simple, environmental friendly and selective sample preparation technique employing porous membrane protected micro-solid phase extraction (μ-SPE) loaded with molecularly imprinted polymer (MIP) for the determination of ochratoxin A (OTA) is described. After the extraction, the analyte was desorbed using ultrasonication and was analyzed using high performance liquid chromatography. Under the optimized conditions, the detection limits of OTA for coffee, grape juice and urine were 0.06 ng g−1, 0.02 and 0.02 ng mL−1, respectively while the quantification limits were 0.19 ng g−1, 0.06 and 0.08 ng mL−1, respectively. The recoveries of OTA from coffee spiked at 1, 25 and 50 ng g−1, grape juice and urine samples at 1, 25 and 50 ng mL
... Show More