Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
Objective(s): To evaluate youth's health risk behaviors in Baghdad City and to determine the relationship between such behaviors and the youth's demographic characteristics of age, gender and grade. Methodology: A descriptive study, using the evaluation approach, is carried out to evaluate youth's health risk behaviors in Baghdad City for the period of January 26th 2016 to May 20th 2016. A non-probability "purposive" sample of (160) University students is selected for the purpose of the study from four groups of colleges (medical, engineering, sciences, and education) and it is equally distributed of
Itraconazole (ITZ) is an antifungal drug (BCSII) used for the treatment of local and systemic fungal infections. Furthermore, ITZ used as an antifungal prophylaxis for immunocompromised patients.
The objective of the study is to overcome the two problems of low and pH dependent solubility of ITZ by its preparation as floating microparticles.
Firstly, pH-dependent floating microparticles were prepared using oil in water solvent evaporation method, from which the best one (F7) selected as a best pH-dependent formula with composition of ITZ (200mg),EC (800mg), HPMC 15cps (200mg) and safflower oil (2ml) .Then, F7 was compared with the selected Relatively pH-independent ITZ floating microparticles formula wit
... Show MoreBackground: Acute coronary syndrome (ACS) is a common disease, and a major determinant of morbidity and mortality in all races. The pleiotropic effects of the receptor activator of nuclear factor-kappa B ligand (RANKL) such as modulation of cell survival, mineralization and inflammation, make it an interesting candidate mediator in the progression and destabilization of atherosclerotic lesions.Objectives: This study was performed to investigate the role of RANKL in the pathogenesis of ACS.Methods: The levels of RANKL were measured by ELISA method in sera of 60 ACS patients, 31 patients with unstable angina (UA) and 29 patients with myocardial infarction (MI) in comparison with 20 apparently healthy controls.Results: Current data indicate
... Show MoreSelexipag is an orally selective long-acting prostacyclin receptor agonist, which indicated for the treatment of pulmonary arterial hypertension. It is practically insoluble in water ( class II, according to BCS). This work aims to prepare and optimized Selexipag nanosuspensions to achieve an enhancement in the in vitro dissolution rate. The solvent antisolvent precipitation method was used for the production of nanosuspension, and the effect of formulation parameters (stabilizer type, drug: stabilizer ratio, and use of co-stabilizer) and process parameter (stirring speed) on the particle size and polydispersity index were studied. SLPNS prepared with Soluplus® as amain stabilizer (F15) showed the smallest particle size 47nm wi
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe research deals with the concept of a New Urbanism as an urban development strategy in the suburbs of cities or in its centers that are affected by pedestrian-oriented design and the possibility of walking, as well as integrating economic classes through the diversity of housing and its costs, and this works to facilitate access to jobs and services while providing more diverse neighborhoods and reducing the use of cars , As designing separate houses in the suburbs and increasing car trips poses a threat to the environment and the quality of urban life, and thus the new urban provides a good strategy for developing
... Show MoreThere are many aims of this book: The first aim is to develop a model equation that describes the spread of contamination through soils which can be used to determine the rate of environmental contamination by estimate the concentration of heavy metals (HMs) in soil. The developed model equation can be considered as a good representation for a problem of environmental contamination. The second aim of this work is to design two feed forward neural networks (FFNN) as an alternative accurate technique to determine the rate of environmental contamination which can be used to solve the model equation. The first network is to simulate the soil parameters which can be used as input data in the second suggested network, while the second network sim
... Show MoreIn this study the Sub family of Nomiinae Robertson,1904 (Hyminoptera: Halictidae) was revised There were five species registered in our investigation: