User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.
MR Younus, Nasaq Journal, 2022
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThe first aim of the present study was performed to assay the activity of arginase in sera of women with uterine fibroid.. This study consisted of(50) women with uterine fibroid as patient's group and (30) healthy women as control group. The age ranged between (30-55) years for the two groups. The results showed that highly significant increase (P< 0.0001) in the arginase activity in sera of women with uterine fibroid (7.99± 0.23) I.U/L is found when compared with healthy group (0.52±0.02) I.U/L. The second aim was performed to isolate arginase from sera of women with uterine fibroids. The purification is done by addition of ammonium sulfate, dialysis, gel filtration chromatography by using sephadex G-50 and ion exchange chromatography
... Show MoreThis study was performd on 50 urine specimens of patients with type 2 diabetes, in addition, 50 normal specimens were investigated as control group. The activity rate of maltase in patients (6.40±2.17) I.U/ml and activity rate of maltase in normal (0.44±0.20)I.U/ml. The results of the study reveal that maltase activity of type 2 diabetes patient's urine shows significant increase (P<0.01) compare to normal.
The first aim of the present study was performed to assay the activity of arginase in sera of women with uterine fibroid.. This study consisted of(50) women with uterine fibroid as patient's group and (30) healthy women as control group. The age ranged between (30-55) years for the two groups. The results showed that highly significant increas (P< 0.0001) in the arginase activity in sera of women with uterine fibroid (7.99± 0.23) I.U/L is found when compared with healthy group (0.52±0.02) I.U/L. The second aim was performed to isolate arginase from sera of women with uterine fibroids. The purification is done by addition of ammonium sulfate, dialysis, gel filtration chromatography by using sephadex G-50 and ion exchange chromatography by
... Show MoreBackground: Insertion sequence is a short DNA sequence encode for proteins implicated in the transposition activity. Transposase catalyzes the enzymatic reaction allowing the insertion sequence to +9*lo2 move. ;qqa;.
Objective: To study the sequencing of transposase gene, tnp, IS1216V of S. aureus isolated from food and then compared with that documented in National Center for Biotechnology Information (NCBI).
Methods: Food samples of animal
... Show MoreThe world of Contemplations is a controversial concept among scholars, writers, thinkers and the public. The theory of the dialogue of souls indicates that souls communicate and think with each other despite the distances. Islamic studies have researched this concept, and this research paper aims to explain the concept of the world of Contemplations and what is the dialogue between God Almighty and the souls that God brought forth from the back of Adam and took from them the covenant and pledge to unify Him, and its effects on human life in this world. The researcher found that scholars and writers differ in proving the existence of the world of Contemplations despite the existence of examples of it in verses of the Holy Quran, and that the
... Show More