Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Blades of gas turbine are usually suffered from high thermal cyclic load which leads to crack initiated and then crack growth and finally failure. The high thermal cyclic load is usually coming from high temperature, high pressure, start-up, shut-down and load change. An experimental and numerical analysis was carried out on the real blade and model of blade to simulate the real condition in gas turbine. The pressure, temperature distribution, stress intensity factor and the thermal stress in model of blade have been investigated numerically using ANSYS V.17 software. The experimental works were carried out using a particular designed and manufactured rig to simulate the real condition that blade suffers from. A new cont
... Show MoreIs the efficiency of physical and your endurance is of great importance for some activities and field, as it whenever the situation has improved student career was able to perform physical exertion more with energy saving efforts, so the identification of physical aptitude and endurance private students, was based on that there are positively correlated the carrying of training and pregnancy fact on the shoulders of the student. In other words, physical aptitude and endurance in your control level that can be shown by the student during the performance of training and competitions. Therefore, lies the importance of research to test physical aptitude and endurance your help to reveal the career of the body in the light of their relationship
... Show More
This research aims to apply the Performance Focused Activity Based Costing System in the offices of scientific and advisory services at the University of Technology for the purpose of measuring the cost of services provided by these offices in order to reduce costs. To test the hypothesis of the research, the research was applied in the consulting offices of the University of Technology through the financial statements for the year ending 12/31/2017 of the Scientific and Consulting Services Office of the University of Technology, because the data of these years were issued and audited by the Federal Office of Financial Supervision.
A number of
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
Background: Enterococcus faecalis is emerging as an important endodontic pathogen, which can persist in the environment for extended periods after treatment and may cause endodontic failure. It is known to produce biofilms, a community of bacteria enclosed within a protective polymeric matrix. This study aimed to establish whether the biofilm formation by Enterococcus faecalis can be inhibited with steralium, co+steralium, and 5% sodium hypochlorite in the root surface environment. Materials and Methods: Extracted human teeth were biomechanically prepared, vertically sectioned, placed in the tissue culture wells exposing the root canal surface to E. faecalis to form a biofilm. At the end of the 3rd and 6th weeks, all groups were treated fo
... Show MoreTo date, comprehensive reviews and discussions of the strengths and limitations of Remote Sensing (RS) standalone and combination approaches, and Deep Learning (DL)-based RS datasets in archaeology have been limited. The objective of this paper is, therefore, to review and critically discuss existing studies that have applied these advanced approaches in archaeology, with a specific focus on digital preservation and object detection. RS standalone approaches including range-based and image-based modelling (e.g., laser scanning and SfM photogrammetry) have several disadvantages in terms of spatial resolution, penetrations, textures, colours, and accuracy. These limitations have led some archaeological studies to fuse/integrate multip
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show More