Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Amidst the changes resulting from the subject matter of expression in art. The necessity of searching for the expressive features of thought that leaves different imprints with aesthetic features and values which called for re-modifying the expressive vision of contemporary drawings. Therefore, this research has been concerned with the study of (abstract expressive features in the drawings of (Serwan Baran) and (Eric Barto) - a comparative study), and the research includes four chapters. The first chapter is devoted to explaining the research problem, its importance, need, purpose, and limits, then determining the most important terms mentioned in it. Where the research problem dealt with the subject of abstract expressive feature
... Show MoreThe designer must find the optimum match between the object's technical and economic needs and the performance and production requirements of the various material options when choosing material for an engineering application. This study proposes an integrated (hybrid) strategy for selecting the optimal material for an engineering design depending on design requirements. The primary objective is to determine the best candidate material for the drone wings based on Ashby's performance indices and then rank the result using a grey relational technique with the entropy weight method. Aluminum alloys, titanium alloys, composites, and wood have been suggested as suitable materials for manufacturing drone wings. The requirement
... Show MoreImproving students’ use of argumentation is front and center in the increasing emphasis on scientific practice in K-12 Science and STEM programs. We explore the construct validity of scenario-based assessments of claim-evidence-reasoning (CER) and the structure of the CER construct with respect to a learning progression framework. We also seek to understand how middle school students progress. Establishing the purpose of an argument is a competency that a majority of middle school students meet, whereas quantitative reasoning is the most difficult, and the Rasch model indicates that the competencies form a unidimensional hierarchy of skills. We also find no evidence of differential item functioning between different scenarios, suggesting
... Show MoreOptical fiber chemical sensor based surface Plasmon resonance for sensing and measuring the refractive index and concentration for Acetic acid is designed and implemented during this work. Optical grade plastic optical fibers with a diameter of 1000μm were used with a diameter core of 980μm and a cladding of 20μm, where the sensor is fabricated by a small part (10mm) of optical fiber in the middle is embedded in a resin block and then the polishing process is done, after that it is deposited with about (40nm) thickness of gold metal and the Acetic acid is placed on the sensing probe.
Chronic myelogenous leukemia (CML) is a myeloproliferative neoplasm arises from Bcr-Abl gene translocation (called Ph chromosome) in hematopoietic stem cells (HSCs). This genetic abnormality results in constitutive activation of tyrosine kinase and subsequent uncontrol growth and multiplication of granulocytes. The cornerstone in treatment of CML are tyrosine kinase inhibitors, of which imatinib is the most effectively used. JAK2V617F mutation is an acquired single nucleotide polymorphism (SNP) occurs in JAK2 gene and is associated with many hematological malignancy other than CML. It was thought that the two genetic abnormalities (Bcr-Abl and JAK2V617F) occur mutually; however, growing body of evidences suggested the reverse. This study a
... Show MoreFaces blurring is one of the important complex processes that is considered one of the advanced computer vision fields. The face blurring processes generally have two main steps to be done. The first step has detected the faces that appear in the frames while the second step is tracking the detected faces which based on the information extracted during the detection step. In the proposed method, an image is captured by the camera in real time, then the Viola Jones algorithm used for the purpose of detecting multiple faces in the captured image and for the purpose of reducing the time consumed to handle the entire captured image, the image background is removed and only the motion areas are processe
... Show MoreBackground: Thyroid cancer (TC) is an increasingly prevalent malignancy throughout the world. It has long been recognized that the incidence of TC is higher in women which increases with age. However, the association of gender disparity and age with TC aggressiveness and outcomes are still controversial. The aim of this study was focused on the association of age and gender with histopathological characteristics in TC. Methods: 153 patients who met the criteria, were selected. The included cases were divided into four age groups (≤24 years, 25-44 years, 45-64 years, and ≥65 years). Demographic, age and pathological parameters were compared among them. The association of gender and age with
... Show MoreThe aim of the present research is to identify the test wisdom and the engagement with learning and psychological tension among postgraduate students at the University of Samarra according to the variables of the department, gender, age, and whether students are employee or non-employee. The study also attempts to identify the relationship between the test wisdom and the engagement with learning and psychological tension. The research sample consisted of (75) postgraduate students randomly selected from college of Education. The researcher applied the test–wisdom of (Mellman & Ebel) and the scale of engagement with learning preparation by (Al-zaabi 2013). In addition, the researcher used the list of the psychological stress of (Abu
... Show MoreThis aim of this study is to assess the Tigris River sediments and utilize them as a new abrasive for the preparation of polished surface of magnetite ore to be studied under reflected light ore microscope. Such polishing process was tested using 250, 125, 71, 45, 25 and 18μm grain sizes of the river sediments. For the completion of the polishing and to obtain a glossy perfect polished surface, the 7 and 2.5 μm sized standard diamond pastes were used. After each polishing stage, the reflectance and roughness of these surfaces were measured as an evaluation step for the polishing efficiency. The reflectance values (R%) of the magnetite surface were found to be reversely proportioned to the abrasive grain size; while the surface roughnes
... Show MoreThe temperature control process of electric heating furnace (EHF) systems is a quite difficult and changeable task owing to non-linearity, time delay, time-varying parameters, and the harsh environment of the furnace. In this paper, a robust temperature control scheme for an EHF system is developed using an adaptive active disturbance rejection control (AADRC) technique with a continuous sliding-mode based component. First, a comprehensive dynamic model is established by using convection laws, in which the EHF systems can be characterized as an uncertain second order system. Second, an adaptive extended state observer (AESO) is utilized to estimate the states of the EHF system and total disturbances, in which the observer gains are updated
... Show More