Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Background: Whey protein is the green-yellow colored, liquid portion of the milk, and it is also called the cheese serum, it is obtained after the separation of curd, during the coagulation of the milk. It contains a considerable amount of α-helix pattern with an evenly distributed hydrophobic and hydrophilic as well as basic and acidic amino acids along with their polypeptide chain. The major whey protein constituents include β-lactoglobulin (β-LG),α-lactalbumin (α-LA), immunoglobulins (IG), bovine serum albumin (BSA), bovine lactoperoxidase (LP), bovine lactoferrin (BLF) and minor amounts of a glycol macro peptide (GMP). Osseointegration can be defined as a process that is immune driven which leads to the formatio
... Show MoreBackground: White spot lesions are esthetic problems caused by subsurface enamel demineralization that seen as white opacity. Aim of the study: This study aimed to evaluate and to compare the color change after the treatment of the white spot lesions with resin nϔtrton and micro abrasion. Materials and Methods: rtϔ white spot lesions were generated on 48 premolar teeth by the use of a demineralization solution. The teeth were randomly divided using the Diagnodent into three study groups (16 teeth for each group) depending on the depth of the induced lesions: outer enamel, inner enamel and outer dentine. Then each group was fatherly subdivided into two groups (8 teeth for each group) the ϔrst group was treated wit
... Show MoreResearch Summary The aim of the search for knowledge of the effect generative learning strategy in: 1 - Achievement of the second grade. 2 - Systemic thinking for the second grade students when studying the biology. The study sample increased (60) students distributed into two equal experimental and control groups. Prepare the test of 40 pieces of multiple choice type and prepare a test for systematic thinking according to three skills 1. Understand the relationships between the parts of the systemic form and complement the sentences given 2 - complement the relationships between parts of the systemic form 3. Building the systemic form. It was a search result 1- There is a difference of statistical significance (at level 0.05) between th
... Show MoreTooth restoration one of the most common procedures in dental practice. The replacement of the entire restoration leads to loss of tooth structure and increase risk of pulp injury; replacement is also time consuming and costly. According to the minimally invasive approach when minimal defects, repair is the better choice than the total replacement of the restoration. This study aims to evaluate repair rating versus replacement treatment procedure for defective composite fillings among Iraqi dentists. Material and methodology: A questionnaire survey were designed and distributed to 184 post-graduate dentists in Iraq. The inquiry pertained general information; including their clinical experience in years, their preference in terms of direct c
... Show MoreThe study of the validity and probability of failure in solids and structures is highly considered as one of the most incredibly-highlighted study fields in many science and engineering applications, the design analysts must therefore seek to investigate the points where the failing strains may be occurred, the probabilities of which these strains can cause the existing cracks to propagate through the fractured medium considered, and thereafter the solutions by which the analysts can adopt the approachable techniques to reduce/arrest these propagating cracks.In the present study a theoretical investigation upon simply-supported thin plates having surface cracks within their structure is to be accomplished, and the applied impact load to the
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreUpper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that usin
... Show More