Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Some auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones. The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent
... Show MoreSports skills in some individual games require physical and motor qualities to facilitate the process of skill performance and also require the instructor or trainer to use more than one strategy, method and way to bring the performance to the level of mastery and avoid injury. The aim of the research is to know the effect of using special exercises using tools and their effect on teaching the skill of a front shoulder circle. The research hypothesis is that using special exercises with tools has a positive effect on teaching the skill of a front shoulder circle on the rings apparatus. Research method: - The researchers used the experimental method by designing two equal groups, the control and the experimental, to suit the research
... Show MoreAbstract :H.pylori is an important cause of gastric duodenal disease, including gastric ulcers, Mucosa-associated lymphoid tissue (MALT), and gastric carcinoma. biosensors are becoming the most extensively studied discipline because the easy, rapid, low-cost, highly sensitive, and highly selective biosensors contribute to advances in next-generation medicines such as individualized medicine and ultrasensitive point-of-care detection of markers for diseases. Five of ten patients diagnosed with H.pylori ranging in age from 15–85 participated in this research. who [gastritis, duodenitis, duodenal ulcer (DU), and peptic ulcer (PU)] Suspected H.pylori colonies w
... Show MoreEvolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This study successfully synthesized high-performance photodetectors based on Ag-WO3 core–shell heterostructures using a simple and economical two-step pulsed laser ablation in water method and has investigated the electrical characteristics of the Ag@WO3 nanocomposite heterojunction. The Hall effect tests indicate that the synthesized Ag@WO3 exhibits n-type conduction with a Hall mobility of 1.25 × 103 cm2V-1S-1. Dark current–voltage properties indicated that the created heterojunctions displayed rectification capabilities, with the highest rectification factor of around 1.71 seen at a 5 V bias. A photodetector’s responsivity reveals the existence of two response peaks, which are situated in the ultraviolet and visible region. The ph
... Show More