The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion detection systems in the cloud may provide challenges. The pre-established IDS design may overburden a cloud segment due to the additional detection overhead. Within the framework of an adaptively designed networked system. We demonstrate how to fully use available resources without placing undue load on any one cloud server using an intrusion detection system (IDS) based on neural networks. To even more successfully detect new threats, the suggested IDS make use of neural network machine learning (ML).
Objective: Carbamazepine is typically used for the treatment of seizure disorders and neuropathic pain. One of the major problems with this drug is its low solubility in water; therefore the objective of this study was to enhance the solubility of carbamazepine by complexation with cyclodextrin to be formulated as effervescent and dispersible granules.Methods: Solvent evaporation method was used to prepare, binary (Carbamazepine/β-cyclodextrin) complex and ternary (Carbamazepine/β-cyclodextrin/hydroxypropyl methyl cellulose (HPMC E5). The more soluble complex will be further formulated as unit dose effervescent and dispersible granules. The complexes were evaluated for their solubility, drug content, percentage practical yield and
... Show MoreThe present study aims to identify wisdom-based thinking and its relationship to psychological capital. It further aims to find out the differences in the level of wisdom-based thinking and psychological capital according to the variables of gender and specialization (scientific, humanities). To achieve this, the study has been conducted on a sample of (380) male and female students. The two scales, wisdom-based thinking and psychological capital are implemented to the sample after being constructed by the researcher and after ensuring their psychometric characteristics' suitability for the study's aims. Results concerning the first aim have shown that there is a significant relationship among students. The second aim has revealed that t
... Show MoreBackground: The base of the denture is largely responsible for providing the prosthesis with retention, stability, and support by being closely adapted to the oral mucosa. However; the process of bone resorption is irreversible and may lead to an inadequate fit of the prosthesis; this can be overcome by relining. Materials and methods: Acrylic based soft denture liner is prepared by preparing polymer from purified methylmethacrylate monomer with (10-2) initiator and (30%) dibutylphthalate plasticizer concentrations. Biological properties were evaluated in comparison with the control material through subcutaneous specimens' implantation in the New Zealand rabbits. Excisional biopsies were taken after (1, 3, days 1, 2, 3, 4 weeks) period. Mic
... Show MoreOptimizing the Access Point (AP) deployment has a great role in wireless applications due to the need for providing an efficient communication with low deployment costs. Quality of Service (QoS), is a major significant parameter and objective to be considered along with AP placement as well the overall deployment cost. This study proposes and investigates a multi-level optimization algorithm called Wireless Optimization Algorithm for Indoor Placement (WOAIP) based on Binary Particle Swarm Optimization (BPSO). WOAIP aims to obtain the optimum AP multi-floor placement with effective coverage that makes it more capable of supporting QoS and cost-effectiveness. Five pairs (coverage, AP deployment) of weights, signal thresholds and received s
... Show MoreNon uniform channelization is a crucial task in cognitive radio receivers for obtaining separate channels from the digitized wideband input signal at different intervals of time. The two main requirements in the channelizer are reconfigurability and low complexity. In this paper, a reconfigurable architecture based on a combination of Improved Coefficient Decimation Method (ICDM) and Coefficient Interpolation Method (CIM) is proposed. The proposed Hybrid Coefficient Decimation-Interpolation Method (HCDIM) based filter bank (FB) is able to realize the same number of channels realized using (ICDM) but with a maximum decimation factor divided by the interpolation factor (L), which leads to less deterioration in stop band at
... Show MoreA novel series of chitosan derivatives were synthesized via reaction of chitosan with carbonyl compounds and grafted it’s by with different amine compounds substituted hydrogen. The produced polymers were characterized by different analyses FTIR, 1HCNMR, XRD, DSC and TGA. Solubility in water as well as many solvent was investigated, antibacterial activity of chitosan and its derivatives against two types of bacteria E. coli and S. aureus was also investigated. The results showed that derivatives sort of have antibacterial activities against Esherichia coli (Gram negative) better than chitosan whilst compound IX has better antibacterial against Staphylococcus aureus (Gram positive). SEM analysis showed that increase of surface roughness wi
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More