Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
<p>Analyzing X-rays and computed tomography-scan (CT scan) images using a convolutional neural network (CNN) method is a very interesting subject, especially after coronavirus disease 2019 (COVID-19) pandemic. In this paper, a study is made on 423 patients’ CT scan images from Al-Kadhimiya (Madenat Al Emammain Al Kadhmain) hospital in Baghdad, Iraq, to diagnose if they have COVID or not using CNN. The total data being tested has 15000 CT-scan images chosen in a specific way to give a correct diagnosis. The activation function used in this research is the wavelet function, which differs from CNN activation functions. The convolutional wavelet neural network (CWNN) model proposed in this paper is compared with regular convol
... Show MoreThe deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show More<p>Analyzing X-rays and computed tomography-scan (CT scan) images using a convolutional neural network (CNN) method is a very interesting subject, especially after coronavirus disease 2019 (COVID-19) pandemic. In this paper, a study is made on 423 patients’ CT scan images from Al-Kadhimiya (Madenat Al Emammain Al Kadhmain) hospital in Baghdad, Iraq, to diagnose if they have COVID or not using CNN. The total data being tested has 15000 CT-scan images chosen in a specific way to give a correct diagnosis. The activation function used in this research is the wavelet function, which differs from CNN activation functions. The convolutional wavelet neural network (CWNN) model proposed in this paper is compared with regular convol
... Show MoreSensing insole systems are a promising technology for various applications in healthcare and sports. They can provide valuable information about the foot pressure distribution and gait patterns of different individuals. However, designing and implementing such systems poses several challenges, such as sensor selection, calibration, data processing, and interpretation. This paper proposes a sensing insole system that uses force-sensitive resistors (FSRs) to measure the pressure exerted by the foot on different regions of the insole. This system classifies four types of foot deformities: normal, flat, over-pronation, and excessive supination. The classification stage uses the differential values of pressure points as input for a feedforwar
... Show MoreThis research focuses on detecting the financial corruption cases in Iraq in light of adoption the strategic audit, the paper deals with the problem of the proliferation corruption cases particularly financial in Iraq and dramatically in the presence of audit and control devices as well as inspection and integrity devices, which indicates the existence of deficiencies and weaknesses in those devices in the implementation of audit and control functions in order to detect the corruption cases in the economic units in Iraq.
Stems objective of this research through the provision of approach of strategic audit concepts and indicate the extent importance of adopting of strategic audit as a means to detect the f
... Show MoreBackground: Red clover oil (Trifolium pratense) has isoflavones bunches which have estrogen-like exercises and may establish an option in contrast to hormone substitution treatment. The present study investigated the impact of Red clover oil on bone healing in rats by histomorphometric study. Materials and Methods: Intra bony defect was performed in right femur of thirty six healthy male albino rats. Then these rats were randomly divided into three groups (12 rats each): one control and 2 experimental groups. For control, the bony defect was left for normal healing; for the experimental (S) group, the defect was treated with hemostatic absorbable gelatin sponge; and for experimental (RS) group, the bony defect was treated with 0.2 ml red
... Show MoreThis study aims to encapsulate atenolol within floating alginate-ethylcellulose beads as an oral controlled-release delivery system using aqueous colloidal polymer dispersion (ACPD) method.To optimize drug entrapment efficiency and dissolution behavior of the prepared beads, different parameters of drug: polymer ratio, polymer mixture ratio, and gelling agent concentration were involved.The prepared beads were investigated with respect to their buoyancy, encapsulation efficiency, and dissolution behavior in the media: 0.1 N HCl (pH 1.2), acetate buffer (pH 4.6) and phosphate buffer (pH 6.8). The release kinetics and mechanism of the drug from the prepared beads was investigated.All prepared atenolol beads remained f
... Show MoreThis study aims to encapsulate atenolol within floating alginate-ethylcellulose beads as an oral controlled-release delivery system using aqueous colloidal polymer dispersion (ACPD) method.To optimize drug entrapment efficiency and dissolution behavior of the prepared beads, different parameters of drug: polymer ratio, polymer mixture ratio, and gelling agent concentration were involved.The prepared beads were investigated with respect to their buoyancy, encapsulation efficiency, and dissolution behavior in the media: 0.1 N HCl (pH 1.2), acetate buffer (pH 4.6) and phosphate buffer (pH 6.8). The release kinetics and mechanism of the drug from the prepared beads was investigated.All prepare
... Show MoreFire is one of the most critical risks devastating to human life and property. Therefore, humans make different efforts to deal with fire hazards. Many techniques have been developed to assess fire safety risks. One of these methods is to predict the outbreak of a fire in buildings, and although it is hard to predict when a fire will start, it is critical to do so to safeguard human life and property. This research deals with evaluating the safety risks of the existing building in the city of Samawah/Iraq and determining the appropriateness of these buildings in terms of safety from fire hazards. Twelve parameters are certified based on the National Fire Protection Association (NFPA20