Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreAbstract
Antibiotic treatment of S.typhi is difficult as compared to treatment of acute infection. Antibiotic resistance carried against S.typhi by using 6 kinds of antibiotics from different classes, their results showed that all isolates were high resistance to Ampicillin (99%), Gentamicin (98%), Amikacin (79%) and less resistances Trimethoprim (55%) , Imipenem (60%) and Ceftriaxone(66%) .
The present study focused on the molecular detection of Wzx flippase, Wzy polymerase genes in some Salmonella typhi isolates, Samples were collected from typhoid patients by classical lab work. Antibiotics susceptibilit
... Show MoreOut of 150 clinical samples, 50 isolates of Klebsiella pneumoniae were identified according to morphological and biochemical properties. These isolates were collected from different clinical samples, including 15 (30%) urine, 12 (24%) blood, 9 (18%) sputum, 9 (18%) wound, and 5 (10%) burn. The minimum inhibitory concentrations (MICs) assay revealed that 25 (50%) of isolates were resistant to gentamicin (≥16µg/ml), 22 (44%) of isolates were resistant to amikacin (≥64 µg/ml), 21 (42%) of isolates were resistant to ertapenem (≥8 µg/ml), 18 (36%) of isolates were resistant to imipenem (4- ≥16µg/ml), 43 (86%) of isolates were resistant to ceftriaxone (4- ≥64 µg/ml), 42 (84%) of isolates were resistant to ceftazidime (1
... Show MoreMaintaining the quality of apricot fruits during storage is not an easy task due to the changes in their physical and chemical properties, so it is necessary to use less expensive, easy to apply, environmentally friendly, and safer preservatives to maintain the nutritional value of apricot. The damage to some fruits during storage can be a source of infection, which leads to the damage of healthy fruits more quickly, which requires building an intelligent model to detect damaged fruits. The aim of the research is to study the effect of immersing apricots in lemon juice once and sugar-water solution again on the quality properties of apricots, including sweetness, color, hardness, and water content. On the other hand, the YOLOv7 algorithm wa
... Show MoreUltrasonic extraction is an inexpensive, simple and efficient alternative to conventional extraction techniques, as compared with other novel extraction techniques such as microwave-assisted extraction & supercritical fluid extraction techniques, the ultrasound apparatus is cheaper and its operation is easier. Ultrasound assisted extraction has risen rapidly in the latest decade, and for most applications it has proven to be effective compared to traditional extraction techniques. In this paper, a method of ultrasonic-assisted extraction was used to extract Inulin from tubers of Jerusalem artichoke, which have been reported to have several medicinal properties and uses. Inulin is a storage carbohydrate found in many plants especially
... Show MoreThe accurate extracting, studying, and analyzing of drainage basin morphometric aspects is important for the accurate determination of environmental factors that formed them, such as climate, tectonic activity, region lithology, and land covering vegetation.
This work was divided into three stages; the 1st stage was delineation of the Al-Abiadh basin borders using a new approach that depends on three-dimensional modeling of the studied region and a drainage network pattern extraction using (Shuttle Radar Topographic Mission) data, the 2nd was the classification of the Al-Abiadh basin streams according to their shape and widenings, and the 3rd was ex
... Show MoreNations are developed with education and knowledge that raise the status of society in its various segments, beyond that it leads to underdevelopment and deterioration in various sectors, whether economic, health, social, etc. If we considered the general name of The ministry of Education & Scientific Studies, then the second part seems to be not functioning, since scientific research has no material allocation and remains based on the material potential of the university professor. As for the first half of the topic, the reality of the situation reveals problems related to the Holy Trinity of Education which is (Professor - Student - the scientific method) where universities suffer at the present time from this problem, and
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show More