Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAutomated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breat
... Show Moreplanning is among the most significant in the field of robotics research. As it is linked to finding a safe and efficient route in a cluttered environment for wheeled mobile robots and is considered a significant prerequisite for any such mobile robot project to be a success. This paper proposes the optimal path planning of the wheeled mobile robot with collision avoidance by using an algorithm called grey wolf optimization (GWO) as a method for finding the shortest and safe. The research goals in this study for identify the best path while taking into account the effect of the number of obstacles and design parameters on performance for the algorithm to find the best path. The simulations are run in the MATLAB environment to test the
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreThis research includes study of the effect of two kinds of Anthocyanin extracted , from extracted orange fruit ( Anthocyanin Evolvulus ,Methiola Violet ) on two types of pathological bacteria E.coli , staphylococcus aureus. The result shows that two kinds of extraction have nearly similar effect , and there is Inhibition zone of no growth between 10-12mm ,and the extraction (1) that has concentration of 10-3 mol./L is more effective..
This study was conducted in the College of Agriculture fields /University of Baghdad, during Autumn 2013. This study was aimed to examine the mortality rate on the all black fly stages of Acaudalerodes rachipora Singh) by the biotic fungus Beuveria bassiana. The results of a preliminary survey showed that the samples of Ziziphus spaina christi were infested by blakflies in Agriculture collage during Autumn seasons of 2013 , the presence of species of black flies A. rachipora on the lower surface of the leaf, the study aimed to study and research the effects of fungus B. bassiana on black fly A. rachipora. After six days of treatment results showed the continued superiority 106 spore / ml trends in the western, southern and
... Show MoreThe Co(II), Ni(II) ,Cu(II), Zn(II) ,Cd(II) and Hg(II) complexes of mixed of amino acid (L-Proline ) and Trimethoprim antibiotic were synthesized. The complexes were characterized using solubility, melting point, conductivity measurement ,. and determination the percentage of the metal in the complexes by flame(AAS).Magnetic susceptibility, Spectroscopic Method [FT-IR and UV-Vis]. Draw the proposed structure of the complexes using program , Chem. office 3D(2006). The ligands and there metal complexes were screened for their antimicrobial activity against four bacteria (gram + ve) and (gram -ve){Escherichia coli, Pseudomonas aeruginosa, Staphylococcus aureus and Bacillus}.The proposed structure of the complexes using program , Chem office 3D(
... Show MoreThe Co(II), Ni(II) ,Cu(II), Zn(II) ,Cd(II) and Hg(II) complexes of mixed of amino acid (L-Proline) and Trimethoprim antibiotic were synthesized. The complexes were characterized using solubility, melting point, conductivity measurement ,. and determination the percentage of the metal in the complexes by flame(AAS).Magnetic susceptibility, Spectroscopic Method [FT-IR and UV-Vis]. Draw the proposed structure of the complexes using program , Chem. office 3D(2006). The ligands and there metal complexes were screened for their antimicrobial activity against four bacteria (gram + ve) and (gram-ve){Escherichia coli, Pseudomonas aeruginosa, Staphylococcus aureus and Bacillus}.The proposed structure of the complexes using program , Chem office 3D(20
... Show More