Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
The study aimed to establish the association of miR-153-3p expression with treatment response to IM in CML patients. Sixty CML patients were included and divided into two groups consistent with their response to treatment whether sensitive or resistant to IM. Ten healthy normal participants were enrolled as control group. RNA was extracted from serum to work out miR-153-3p expression utilizing real-time quantitative reverse transcription polymerase chain reaction. The primers were supplied by Macrogen Inc. Twenty seven patients were sensitive to imatinib and 33 were resistant to imatinib. The ratio of male to female was 1.14:1. The bulk (58%) of patients were within the age range of 41-60 years. Weight and gender did not significantly diffe
... Show MoreThe paper presents mainly the dynamic response of an angle ply composite laminated plates subjected to thermo-mechanical loading. The response are analyzed by analytically using Newmark direct integration method with Navier solution, numerically by ANSYS. The experimental investigation is to fabricate the laminates and to find mechanical and thermal properties of glass-polyester such as longitudinal, transverse young modulus, shear modulus, longitudinal and transverse thermal expansion. Present of temperature could increase dynamic response of plate also depending on lamination angle, type of mechanical load and the value of temperature.
Nowadays, after the technological development in societies, cloud computing has become one of the most important technologies. It provides users with software, hardware, and platform as remote services over the Internet. The increasing number of cloud users has caused a critical problem in how the clients receive cloud services when the cloud is in a state of instability, as it cannot provide required services and, thus, a delay occurs. Therefore, an algorithm was proposed to provide high efficiency and stability to work, because all existing tasks must operate without delay. The proposed system is an enhancement shortest job first algorithm (ESJF) using a time slice, which works by taking a task in the shortest time first and then the l
... Show MoreAuthentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi
The present paper discusses one of the most important Russian linguistic features of Arabic origin Russian lexes denoting some religious worship or some political and social positions like Qadi, Wally, Sultan, Alam, Ruler, Caliph, Amir, Fakih, Mufti, Sharif, Ayatollah, Sheikh.. etc. A lexical analysis of the two of the most efficient and most used words of Arabic origin Russian lexes that are “Caliph and Sheikh” is considered in the present study. The lexicographic analysis of these words makes it possible to identify controversial issues related to their etymology and semantic development.
The study is conducted by the use of the modern Russian and Arabic dictionary, specifically, (Intermediate lexicon Dictionary
... Show MoreTo evaluate the Interaction of Mn(II), Fe(II), Co(II), Ni(II),Cu(II), Zn(II) And Cd(II) Mixed- Ligand Complexes of cephalexin mono hydrate (antibiotics) And Furan-2-Carboxylic Acid To The Different DNA Sources. All the metal complexes were observed to cleave the DNA. A difference in the bands of complexes .The cleavage efficiency of the complexes compared with that of the control is due to their efficient DNA-binding ability and the other factors like solubility and bond length between the metal and ligand may also increase the DNA-binding ability. The ligands (Cephalexin mono hydrate (antibiotics) and Furan-2- Carboxylic acid and there newly synthesized metal complexes shows good antimicrobial activities and Binding DNA , thus, can be used
... Show MoreQuinolones L1 (ciprofloxacin) are manufactured wide range anti-infection agents with great oral ingestion and magnificent bioavailability. Because of the concoction capacities found on their core (a carboxylic corrosive capacity at the 3-position) and much of the time an essential piperazinyl ring (or anothertN-heterocycle) at the 7-positionh and a carbonylvoxygenc atomi atothel 4-positioni) quinolones bind metal particlesiframing buildings which can go about as bidentate. Bidentateiligands L2=2-phenyl-2-(P-methoxy anilinee) acetonitrilel was set up by the response of Primiryiaminejwithjbenzaldehyde, in nearness of potassiumbcyanidej and acidicimedia . Theimetalledifices were portrayed by the miniaturized scale component examination (C.H
... Show MoreArab translators have always paid great attention to the translation of the Persian literary genres, in particular, contemporary Iranian novels. They have always translated for the most prominent Iranian novelists such as Jalal Al Ahmad, Sadiq Hidayat, Mahmoud Dowlatabadi, Bozorg Alavi, Ismail Fasih, Houshang Golshiri, Gholam-Hossein Saedi, Simin Daneshvar, Sadiq Chubak, Samad Behrangi and others that have succeeded in perfectly picturing the Iranian society.
Within the perspectives of Arab translators and by using the descriptive - analytical approach, the present study provides an analytical study of the translation into Arabic some of the modern Persian novels. Moreove
... Show MoreHigh temperature superconductor with nominal composition Bi1.6Pb0.4Sr1.8Ba0.2Ca2 Cu3O10+? was prepared by solid state reaction method. Two sets of samples have been prepared .The first one was quenched in air; the second set was quenched in liquid nitrogen. X-ray diffraction analyses showed an orthorhombic structure with two phases, high –Tc phase (2223) and low-Tc phase (2212) in addition to that impure phase was found. It has been observed that quenched in air samples display a sharp superconducting transition and a higher-Tc phase than that of the quenched in liquid nitrogen samples.
Although the axial aptitude and pile load transfer under static loading have been extensively documented, the dynamic axial reaction, on the other hand, requires further investigation. During a seismic event, the pile load applied may increase, while the soil load carrying capacity may decrease due to the shaking, resulting in additional settlement. The researchers concentrated their efforts on determining the cause of extensive damage to the piles after the seismic event. Such failures were linked to discontinuities in the subsoil due to abrupt differences in soil stiffness, and so actions were called kinematic impact of the earthquake on piles depending on the outcomes of laboratory