User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.
In this study, from a total of 856 mastitis cases in lactating ewes, only 34 Streptococcus agalactiae isolates showed various types of resistance to three types of antibiotics (Penicillin, Erythromycin and Tetracycline). St. agalactiae isolates were identified according to the standard methods, including a new suggested technique called specific Chromogenic agar. It was found that antibiotic bacterial resistance was clearly identified by using MIC-microplate assay (dilution method). Also, by real-time PCR technique, it was determined that there were three antibiotics genes resistance ( pbp2b, tetO and mefA ). The high percentage of isolate carried of a single gene which was the Tetracycline (20.59%) followed by percentage Penicillin was
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThis study aims to determine the extent to which Palestinian elites use digital diplomacy to confront the Israeli narrative by exploring the motives for usage, patterns, essential digital diplomatic tools, and achieved satisfactions. The study adopted a survey methodology and employed a questionnaire distributed to a sample of 110 Palestinian political and media elites.
The study arrived at several key findings, including: Palestinian elites allocate a substantial (%67) of their efforts towards employing digital diplomacy as a response to the Israeli narrative. The foremost platforms employed for this purpose are Facebook and Twitter. The primary motivation for utilizing these digital platforms is to present
the financial resources represent a basic factor of production ;It is obvious that the housing sector needs the resources to finance the building operation to produce all the housing units. Finance is the cornerstone of any housing strategy , as its successes dependent on the success of the financing methods and the creation of charnels and effective methods for the provision of the required finances for both individuals and instantly concerned with the production of housing units. The kinds of financial institutions vary from one country to another according to the nature of the economic and financial system. The lending conditions also vary as well as the capital cost of the housing units needed The housing operations is concer
... Show MoreMR Younus, Nasaq Journal, 2022
Background: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.
Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.
Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected.
... Show MoreThe research paper deals with the role of the place making in eco-tourism through a review of international experiences in the eco-tourism industry and its contribution to advancing the reality of tourism there, and attracting the largest number of tourists. The study is divided into five axes: the first is a study of related concepts, and the second is a study of global experiences, which included three countries: (South Bank (Gabriel's Wharf) - London, Rotterdam in the Netherlands, and dealt with each of Happy Streets and Kendrick Mills, and then the Perak River tourist corridor - Malaysia). As for the third axis, it is concerned with analyzing these experiences to reach th
... Show MoreAs human societies grow, the problem of waste management becomes one of the pressing issues that need to be addressed. Recycling and reuse of waste are effective waste management measures that prevent pollution and conserve natural resources. In this study, the possibility of using glass waste as an alternative was used as a partial weight substitute for fine aggregates with replacement ratios of 10, 20, 30, and 40% by the weight, and formed into test models (15 cm * 15 cm ) cube and (15 cm * 30 cm) cylinder, then matured and tested their strength compression and tensile strength at the age of 7 and 28 days and compared with a reference or conventional concrete with a mixing ratio (1: 1.5: 3) as well as testing its worka
... Show More