The amino acids in the liver of chick embryo was analysed for ages (7, 11, 14 and 19) days incubation and small chicken aged (14) days after hatching and adult. The study recorded (18) amino acid, the highest concentration of amino acids in the liver of embryo age (7) days incubation was Cysteine (Cys) and in small chicken aged (14) day after hatching, the following amino acids were found: Asparagine (Asn), Alanine (Ala), Histidine (His), Threonine (Thr), Valine (Val), Lysine (Lys), as well as in adult the following amino acids were recorded the highest concentration: Aspartic (Asp), Glutamic (Glu), Serine (Ser), Arginine (Arg), Proline (Pro), Glycine (Gly), Tyrosine (Tyr), Methionine (Met), Isoleucine (Ile), Leucine (Leu) and phenyl alanine (Phe). The lowest concentration of the amino acid was in embryo age (14) day incubation and include: Asparagine (Asn), Alanine (Ala), Glycine (Gly), Threonine (Thr), Tyrosine (Tyr), Valine (Val), Methionine (Met), histidine (His), Isoleucine (Ile) and Leucine (Leu), as well as at embryo age (19) day incubation which were: Serine (Ser), Cysteine (Cys) and Proline (Pro), whilethe low concentrations of amino acids include: Aspartic (Asp), Glutamic (Glu), Arginine (Arg) and Phenyl alanine (Phe).The statistical findings showed high significant differences between all ages mentioned and the amino acids except for lysine amino acid (Lys), which did not show any significant differences among all ages.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreIncorporating waste byproducts into concrete is an innovative and promising way to minimize the environmental impact of waste material while maintaining and/or improving concrete’s mechanical characteristics and strength. The proper application of sawdust as a pozzolan in the building industry remains a significant challenge. Consequently, this study conducted an experimental evaluation of sawdust as a fill material. In particular, sawdust as a fine aggregate in concrete offers a realistic structural and economical possibility for the construction of lightweight structural systems. Failure under four-point loads was investigated for six concrete-filled steel tube (CFST) specimens. The results indicated that recycled lightweight co
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show More