KE Sharquie, KI Al-Hamdi, AA Noaimi, AA Al-Mohammadi, J Clin Exp Invest www. clinexpinvest. org Vol, 2011 - Cited by 1
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe research summarizes the knowledge of the dimensions and denotations of T.V advertisement; and its constituents for building it through the semiotic approach of an ad sample represented by the announcement of Zain Kuwait Telecom Company which carries the title "Mr. President" using Roland Barth's approach, starting with the designation, implicit, and linguistic reading to reach the narrative features and their denotations. That makes television advertising as a semiotic and pragmatic discourse in view of the still and motion picture with its efficiency and strength to inform and communicate. And what lies in it of aesthetic, artistic elements; informational and effective power in influencing the recipients by focusing on narratives and a
... Show MoreThis Study was conducted to investigate vaginitis in women who live in Baghdad City. Results Revealed that Candida spp. were the causal agent of 38.5% of symptomatic cases the yeasts Candidaalbicans, C.glabrata, C.tropicalis, C.parapsilosis and C.krusei were isolated with the percentage of 38.1, 9.1, 3.9, 2.6, 1.3 respectively also there were 18% of women in control group carrying Candida spp. The direct smear method were not efficient because the percentage of infection was 17.5% comparing with the culture method the sensitivity of direct smear method was 45.5% The percentage of WBC to Epithelial cells was less than one in 76.6% of women.
The current study explores the theme of ‘identity crisis’ in Fadia Faqir’s Willow Trees Don't Weep (2014) from a socio-pragmatic perspective. The study aims to examine the identity crisis using socio-pragmatic tools, delineate the aspects of identity crisis and showcase the social factors that shape the main character’s identity crisis. To conduct this study, an eclectic model incorporating Searle's (1969) taxonomy of speech acts, Prince et al.’s (1982) hedges and Grice’s (1975) conversational implicature will be used. The analysis reveals that only representative and expressive speech acts are utilized, with the representative speech act of stating being the dominant one. For hedges, modal verbs are the dominant ones. O
... Show MoreObjective: Aimed to asses the role of PT estimation in early diagnosis and predicting the extent and the outcome of head injury with ICerH and/ or Contusion
Method :PT was measured by Digiclot 818
Group –1: One hundred consecutive head injured patients admitted at Neurosurgical and Al Ramadi teaching hospitals were initially estimated for prothrombin time and subsequently scanned
Group-2 : Two hundred twenty five consecutive non scanned head injured patients admitted to Neurosurgical and Al Ramadi teaching hospitals were estimated with prothrombin time at the time of insult and subsequently for the next two weeks Al – Kindy Col Med J 2012; Vol. 8 No. 1 P: 54
Clinical and neurological evaluation (GCS) score in addition to
In this paper we have dealt with the word " בַּיִת" in the Book of Joshua because it makes one of those that highly employed the word בַּיִת" " in the Old Testament. The Book of Joshua comes sixth in the order of tanakh wich was written by Joshua son of Noon in Palestine during the fifteenth century B.C. and it covers a three-decade era extending from the death of Moses til the death of Joshua son of Noon.
The word " בַּיִת " in this paper refers to the place, where expressions are made by a noun modified by a noun . The modifier is"" בַּיִת , and the modified is another noun. Herein, we
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show More