What has reached us from this great heritage left by our scientists book ((masterpiece of honor by knowing the parties)) to the conservative privilege, which Imam Safadi said ((Sheikh of time, and the preservation of the era, and critic of the time, if his son Ibn Makola had a drink and eaten, and make it to him So, after trusting in God, I thought that I should write a paper highlighting the life of this great world and explaining its methodology in this useful book in which Imam Ibn Hajar al-Asqalani said: `` The use of it took place east and west, and the scholars competed in collecting it after. And soon)).
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA reliable and environmental analytical method was developed for the direct determination of tetracycline using flow injection analysis (FIA) and batch procedures with spectrophotometric detection. The developed method is based on the reaction between a chromogenic reagent (vanadium (III) solution) and tetracycline at room temperature and in a neutral medium, resulting in the formation of an intense brown product that shows maximum absorption at 395 nm. The analytical conditions were improved by the application of experimental design. The proposed method was successfully used to analyze samples of commercial medications and verified throughout the concentration ranges of 25–250 and 3–25 µg/mL for both FIA and batch procedures, respecti
... Show MorePesticides serve a crucial function in contemporary farming practices, safeguarding agricultural crops against pest infestations and boosting production outputs. However, indiscriminate use has caused environmental and human health damage. This study aimed to develop and validate a gas chromatography-flame ionization detection (GC-FID) methodology for the direct and routine analysis of spiromesifen residues in soil, leaves, and tomato fruits. The proposed method prioritizes simplicity by avoiding derivatization steps, offering advantages over existing approaches that utilize lengthy multi-step extraction or derivatization prior to GC analysis. A key novelty of this work is the development of a QuEChERS extraction coupled directly to GC-FID
... Show MoreBy- products of corn starch industry were used to prepare media for propagation the lactic acid bacteria as a natural auxotroph. The by- products used were the corn steep water (S) and gluten extract (G) after a proper treatment to get them ready for media preparation. The results showed that it was possible to replace the peptone and meat extract by gluten extract in MRS medium. The growth was approximately similar to that obtained in standard MRS media. Corn steep water (S) was used as well and the growth enhanced by including Tween – 80 at 1% level. The later media named MZ, which was superior for growing standard and local strains and starters. The MZ medium modified by adding acetate and glacial acetic acid similarly to
... Show MoreIn this research, we did this qualitative and quantitative study in order to improve the assay of aspirin colorimetrically using visible spectrophotometer. This method depends on aqueous hydrolysis of aspirin and then treating it with the ferric chloride acidic solution to give violet colored complex with salicylic acid, as a result of aspirin hydrolysis, which has a maximum absorption at 530nm. This procedure was applied to determine the purity of aspirin powder and tablet. The results were approximately comparative so that the linearity was observed in the high value of both correlation coefficient (R= 0.998) and Determination Coefficient or Linearity (R2= 0.996) while the molar absorpitivity was 1.3× 103 mole
The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
In this paper, the computational complexity will be reduced using a revised version of the selected mapping (SLM) algorithm. Where a partial SLM is achieved to reduce the mathematical operations around 50%. Although the peak to average power ratio (PAPR) reduction gain has been slightly degraded, the dramatic reduction in the computational complexity is an outshining achievement. Matlab simulation is used to evaluate the results, where the PAPR result shows the capability of the proposed method.
The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show More