Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe challenge to incorporate usability evaluation values and practices into agile development process is not only persisting but also systemic. Notable contributions of researchers have attempted to isolate and close the gaps between both fields, with the aim of developing usable software. Due to the current absence of a reference model that specifies where and how usability activities need to be considered in the agile development process. This paper proposes a model for identifying appropriate usability evaluation methods alongside the agile development process. By using this model, the development team can apply usability evaluations at the right time at the right place to get the necessary feedback from the end-user. Verificatio
... Show MoreGiven that the Crimean and Congo hemorrhagic fever is one of the deadly viral diseases that occur seasonally due to the activity of the carrier “tick,” studying and developing a mathematical model simulating this illness are crucial. Due to the delay in the disease’s incubation time in the sick individual, the paper involved the development of a mathematical model modeling the transmission of the disease from the carrier to humans and its spread among them. The major objective is to comprehend the dynamics of illness transmission so that it may be controlled, as well as how time delay affects this. The discussion of every one of the solution’s qualitative attributes is included. According to the established basic reproductio
... Show MoreAerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model to avoid high control chattering. Furthermore, in practical applications of aerial object manipulation, the payloads that ARAs can handle vary, depending on the nature of the task. The high uncertainties due to modeling errors and an unknown payload are inversely proportional to the stability of ARAs. To address the issue of stability, a new adaptive robust controller, based on the Radial Basis Function (RBF) neural network, is proposed. A three-tier approach is also followed. Firstly, a detailed new model for the ARA is derived using the Lagrange–d’A
... Show MoreTwo dimensional meso-scale concrete modeling was used in finite element analysis of plain concrete beam subjected to bending. The plane stress 4-noded quadrilateral elements were utilized to model coarse aggregate, cement mortar. The effect of aggregate fraction distribution, and pores percent of the total area – resulting from air voids entrapped in concrete during placement on the behavior of plain concrete beam in flexural was detected. Aggregate size fractions were randomly distributed across the profile area of the beam. Extended Finite Element Method (XFEM) was employed to treat the discontinuities problems result from double phases of concrete and cracking that faced during the finite element analysis of concrete beam. Crac
... Show MoreA (b,t)-blocking set B in PG(2,q) is set of b points such that every line of PG(2,q) intersects B in at least t points and there is a line intersecting B in exactly t points. In this paper we construct a minimal (b,t)-blocking sets, t = 1,2,3,4,5 in PG(2,5) by using conics to obtain complete arcs and projective codes related with them.
Many international studies indicated that the polymorphisms of some genes disturbed the folate homocysteine (Hcy) metabolism and increased the vulnerability to Down syndrome (DS). We aimed to measure the serum levels of folate and Hcy in DS children and compare the levels with age and sex-matched apparently normal healthy children. We also aimed to study the A80G polymorphism of the gene reduced folate carrier (RFC1) in the DS children as a risk factor. Forty children with DS (24 were boys, and 16 were girls) with the age range between 5-13 years, and 26 normal healthy children (16 boys and ten girls) were included in this study. The results show that the highest genotype in the control group was AG (53.85%) followed by AA and GG (30.
... Show MoreThe present study evaluates the effects of Ginkgo biloba extract as monotherapy on the glycemic status, insulin resistance (IR), body mass index (BMI), and visceral adiposity index (VAI), in addition to the inflammatory markers, oxidative status and leptin level in patients with metabolic syndrome in comparison with metformin.
The study is a randomized, double-blind pilot study conducted during the period May to September, 2020. Fifty patients were recruited in the study and they were allocated into two groups (25 per each group): Ginkgo biloba and Metformin groups, they received (120 mg Ginkgo biloba extract/ capsule) and (500 mg Metformin/ capsule) respectively; orally as a single dose for 90 days. Blood samples were taken at z
... Show MoreThe logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables. The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.
... Show MoreThe study aims to demonstrate the importance of instructional methods in teaching Arabic language as a second language or teaching the Arabic language to non-native speakers. The study is in line with the tremendous development in the field of knowledge, especially in the field of technology and communication, and the emergence of many electronic media in education in general and language teaching in particular. It employs an image in teaching vocabulary and presenting the experience of the Arabic Language Institute for Non-Speakers-King Abdul-Aziz University. The study follows the descriptive approach to solve the problem represented by the lack of interest in the educational methods when teaching Arabic as a second language. Accordingl
... Show More