Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreWireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in
... Show MoreTransportation network could be considered as a function of the developmental level of the Iraq, that it is representing the sensitive nerve of the economic activity and the corner stone for the implementation of development plans and developing the spatial structure.
The main theme of this search is to show the characteristics of the regional transportation network in Iraq and to determine the most important effective spatial characteristics and the dimension of that effect negatively or positively. Further this search tries to draw an imagination for the connection between network as a spatial phenomenon and the surrounded natural and human variables within the spatial structure. This search aiming also to determine the nat
The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreEstimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes
... Show MoreThis study includes synthesis of some nitrogenous heterocyclic compounds linked to amino acid esters or heterocyclic amines that may have a potential activity as antimicrobial and/or cytotoxic. Quinolines are an important group of organic compounds that possess useful biological activity as antibacterial, antifungal and antitumor .8-Hydroxyquinoline (8-HQ) and numerous of its derivatives exhibit potent activities against fungi and bacteria which make them good candidates for the treatment of many parasitic and microbial infection diseases.
These pharmacological properties of quinolones aroused our interest in synthesizing several new compounds featuring heterocyclic rings of the quinoline derivatives linke
... Show MoreSalivary peroxidases have biological functions of particular importance to oral health. The aim of this paper is to shed the light on saliva and serum total peroxidases activity as well as the activity of each of salivary peroxidase (SPO) and myeloperoxidase (MPO) in patients with oral tumors. The studied participants were divided into two groups: the first group included 18 oral squamous cell carcinoma patients and 20 age and gender-matched healthy controls while the second group consisted of 20 oral ossifying fibroma patients and 23 age and gender-matched healthy controls. Total peroxidases activity was determined, and its specific activity was calculated in serum and whole mixed saliva as well as in the supernatant and pellet fractions
... Show MoreThe research includes a clinical study of Arginase and its relation with uterine fibroid. The normal value of arginase activity in female serum was found to be (0.52 ± 0.02 IU/L) in healthy group at age (35-55) years. The study also showed a highly significant increase in arginase activity (7.99 ± 0.23 IU/L) in serum of uterine fibroid patients group at (35-55years) in comparison to healthy.The results also indicated a highly significant increase in the level of progesterone, estradiol, prolactin, peroxynitrite and malondialdehyde in patients group. While a highly significant decrease in concentration of adiponectin in patients group was found in comparison to healthy.