Many financial institutions invest their surplus funds in stocks, either to obtain dividends or for trading purposes and to obtain profits from the difference between the cost and the selling price, and investment in shares represents an important part of the financial position of financial institutions applying to the common accounting system of banks and insurance companies, in addition to their impact It is clear on the result of the activity of these institutions.The aim of the research is to define what the shares and their types are, and to indicate the accounting treatments needed to move towards the process of adopting the International Financial Reporting Standard No. (9) and its reflection on its financial statements. Its activity and the researchers recommended the need to adopt the International Financial Reporting Standard No. (9) to hold companies accountable, especially that their current book values Do not reflect current market indicators.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreOral swab samples were collected from 120 children (ages between one month- 10 years) who were infected with oral thrush and 30 healthy children. The percentages of isolated yeasts and Bacteria were 66.6% and 96.6% respectively. The dominate yeast and bacteria were Candida albicans and Staphylococcus aureus with of 78.7% and 34.4% respectively. Results revealed that the highest percent of infection with oral thrush disease was 32.5% in children within the age of 1-2 months.
The direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li
... Show MoreMethotrxate (MTX) has become the standard of care and first-line therapy for patients who have RA and consider as a gold standard of treatment for RA. The role of MTX in the treatment of RA has now been well established. The use of MTX treatment of RA inhibits proliferation of the lymphocytes, reduces signs and symptoms this disease, reduces progression damage of the joints and improves quality of life outcome. Progranulin (PGRN) acts a role in autoimmune inflammatory, has important function in several processes including immune response. Present study has conducted to find the effect of MTX drugs as a therapeutic target for RA patients because of its ability to bind with tumor necrosis factor receptor (TNFR), with progranulin, obestatin an
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More