Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
Calendula officinalis L. (Asteraceae) known as marigold is known to have several pharmacological activities and used for the treatment of several diseases as measles, jaundice, constipation and several inflammations. Marigold flowers contain several chemical constituents mainly flavonoids, triterpenoids and essential oil. In this study marigold flowers cultivated in Iraq had been investigated for its flavonoids content. The study revealed the presence of quercetin and kaempferol glycosides and the absence of myricetin glycosides. The flowers were extracted with ethanol 70% fractionated with different solvent and the flavonoids were isolated by preparative HPLC. The isolated flavonoids were identified by measuring melting points, UV, IR,
... Show MoreBacterial vaginosis (BV) is one of the most common genital infections among women in the childbearing age. Many novel, fastidious and uncultivated bacterial species are related with BV. These are called bacterial vaginosis associated bacteria (BVAB), present in trace amount and have a significant role in the infection. A total of 80 vaginal swabs were obtained from 80 pregnant and non-pregnant women. Samples were collected from different hospitals in Baghdad city and Al-Kut city.
Clinically, 60 sample among 80 were gave positive results depending on Nugent score and Amsel criteria ,the Bacteriologicall test showed the percentages of gram negative bacteria (E.coli ,K.pneumoniae, P.mirabilis, Ps.aeruginosaand A. baumanniiwere) were (38.
The pathogenicity resulting from Staphylococcus aureus infection has remarkable importance as one of the community-associated bacterial infections, due to the virulent ability of these bacteria to produce biofilms. This study was designed to detect biofilm production in clinical isolates from samples of wounds and urinary tract infections. The expression levels of the icaA gene that is responsible of slime layer production in biofilms was compared in isolates with different biofilm producing capabilities. Fifty seven samples that included 32 samples from urine and 25 samples from wounds were collected from Alwasti Hospital, Al-Kindi Teaching Hospital, and Alzahraa Clinic, Baghdad, Iraq. The bacteria was identified accor
... Show MoreThe results of the present study showed that twenty-five samples were collected for the age group 35–40 years and four samples for the age group 65–70 years for both genders. The results showed that 48 (48%) of the samples were obtained from the hands, 16 (16%) from the legs, 12 (12%) from the abdominal area, and 10 (10%) from the chest area. The four (4%) samples were obtained from burns in the back and thighs area. The samples taken according to the cause of burns were 40 (40%) due to hot water, hot liquids, or hot steam, followed by 18 (18%) due to the use of hot tools, 15 (15%) due to fires, 12 (12%) due to electric currents, 10 (10%) due to chemicals such as strong acids, alkaline lye, paint thinner, or gasoline, and 5 (5%) due
... Show MoreThe major function of the kidney is the filtration and secretion of the final products of metabolism and the excess of electrolytes. The term kidney failure denotes inability of the kidneys to perform excretory function leading to retention of nitrogenous waste products from the blood. Biosensor are most accurate, with a rapid diagnosis ,more costly method than the traditional method to avoid any biological changes in blood sample that lead to changes optical characteristic (refractive index and absorption) of blood sample. The current study was designed to single mode more Sensitivity than multi mode for Biomarkers were recorded for Albumin 5447.06, 5193.93 and Urea sample 2623.14, 1998.44 in sm and mm respectively .
... Show MoreCurrent study aimed to investigate the Respiratory Syncytial Virus (RSV) in nasal
secretion and throat swab samples of hospitalized patients with symptoms of
respiratory tract infection using Immunofluorescence test. Previously these samples
were tested for Respiratory Syncytial Virus infection by reverse transcriptase-PCR
assay. The positive samples were tested by Immunofluorescence assay in monolayer
confluent of Hep 2 cell line. The results showed that the positive samples using the
RT-PCR test were positive in this test. These results reveal that Immunofluorescence
test is sensitive method for detection the infection with RSV.
Herpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati
... Show MoreThis study is carried out to investigate the prevalence of Coxiella burnetii (C. burnetii) infections in cattle using an enzyme-linked immunosorbent assay (ELISA) and polymerase chain reaction (PCR) assay targeting IS1111A transposase gene. A total of 130 lactating cows were randomly selected from different areas in Wasit province, Iraq and subjected to blood and milk sampling during the period extended between November 2018 and May 2019. ELISA and PCR tests revealed that 16.15% and 10% of the animals studied were respectively positive. Significant correlations (P<0.05) were detected between the positive results and clinical data. Two positive PCR products were analyzed phylogenetically, named as C. burnetii IQ-No.5 and C. burnet
... Show MoreA simple and smart algorithm was presented to recognize car plates in parking at the College of Science for Women, University of Baghdad, Iraq. The study consists of recording video clips of all cars parked in the selected area. The studied camera heights were1m and 2m, and the video clips were 19 and 30. Images were extracted from the video clip to be used for training data for the cascade method. Haar classification was used to detect license plates after the training step. Viola-jones algorithm was applied to the output of Haar’s data for both camera heights (1m and 2m). The accuracy was calculated for all data with different weather conditions and local time recoding. The accuracy is 100% for all data in this study.
<
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show More