Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreWe propose a system to detect human faces in color images type BMP by using two methods RGB and YCbCr to determine which is the best one to be used, also determine the effect of applying Low pass filter, Contrast and Brightness on the image. In face detection we try to find the forehead from the binary image by scanning of the image that starts in the middle of the image then precedes by finding the continuous white pixel after continuous black pixel and the maximum width of the white pixel by scanning left and right vertically(sampled w) if the new width is half the previous one the scanning stops.
This study focused on a fundamental issue which was represented by ability of Iraqi central bank in facing the difficulty of determining the optimal ratio of liquidity in the Iraqi banks in terms of the balancing between its obligations to the depositors and borrowers, and liquidate their funds on one hand and the risks on the other hand.the search aimed for achieving the goals which represented by identifying the possibility of Iraqi banks to apply the regulations rules and instructions issued by central bank of Iraq in determining ratio of liquidity and its appropriate with Iraqi banks action to implement a reasonable profit to&
... Show MoreIntelligent or smart completion wells vary from conventional wells. They have downhole flow control devices like Inflow Control Devices (ICD) and Interval Control Valves (ICV) to enhance reservoir management and control, optimizing hydrocarbon output and recovery. However, to explain their adoption and increase their economic return, a high level of justification is necessary. Smart horizontal wells also necessitate optimizing the number of valves, nozzles, and compartment length. A three-dimensional geological model of the As reservoir in AG oil field was used to see the influence of these factors on cumulative oil production and NPV. After creating the dynamic model for the As reservoir using the program Petrel (2017.4), we
... Show MoreThe main object of the current work was to determine the antifungal efficiency of secondary metabolites product called synephrine that extracted from Citrus sinesis peels and the ability of synephrine to biosynthesis gold nanoparticles from HAucl4 which consider environmentally favourable method, then determine their activity against pathogenic human dermatophyte. The identification of synephrine done by Thin layer chromatography (TLC), High Performance Liquid Chromatography (HPLC) and The Fourier Transform Infrared (FTIR). The characterization of gold nanoparticles by using Ultra Violet-Visible Spectroscopy (UV-Vis), Field – Emission Scanning Electron Microscopy (FESEM) and Fourier Transform Infrared (FTIR), confirmed the biosynt
... Show MoreIn this paper, investigates the biosynthesis of gold nanoparticles (AuNPs) by biochemical method using Myrtus communis leaves extract as reducing agent and Chloroauric acid (HAuCl4) as precursors. X-Ray Diffraction (XRD), Scanning Electron Microscopy (SEM) and FTIR were used in addition to UV-visible spectroscopy (UV) in order to characterize the AuNPs. The biosynthesized AuNPs exhibited inhibitory effects on alpha amylase and alkaline phosphatase in sera of patient with type 2 Diabetes Miletus and the sera of healthy control subjects; the inhibition percentage with alpha amylase was 72 % and 45 % for patient and control group respectively. Oral consent obtained from the most of patients and healthy subjects before them being under
... Show MoreThis study aims to evaluate the biocompatibility of a novel filler material intended to improve the longevity of polymer systems used in prosthetics in respect of cytotoxicity and skin irritation. RTV50F silicone elastomer incorporated with various percentages of hexagonal boron nitride (H-BN) (0.1, 0.3, 0.5, 0.7, and 1 wt%) have been tested. Silicone without H-BN was utilized as the control for comparison. The in vitro cytotoxicity test includes specimens (n=18) with 10 mm in diameter and 2 mm in thickness applied directly to the normal human fibroblast cell line (NHF) and incubated for 72 hours, then 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) assay was used to determine the cell viability. The skin irritati
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More