Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Premature degradation is the problem of maxillofacial silicones, significantly affected by ultraviolet exposure, contributing to silicones photodegradation. Degradation necessitates frequent replacement of prostheses that increase the total cost of rehabilitation.
This study evaluated the effect of bisoctrizole on the ultraviolet absorption properties of silicone material and the stability of this absorption over time. Also, the bisoctrizole effect on the surface roughness of silicone was evaluated.
Objectives: The study aims to identify the effects of an educational program on patients’ knowledge about vascular access care and to find out the relationship between patients knowledge scores and their selected demographic variable. &
... Show MorePropaganda speech in the Gulf press articles about the Qatari crisis, an analytical study in the political articles published in the newspapers (Riyadh) Saudi Arabia and (Al-Ittihad) UAE from 5/6/2017 to 5/9/2017, University of Baghdad, College of Media, Press Department, 2019. The problem of the research was to monitor the contents of propaganda messages to Saudi Arabia and the UAE regarding the Qatari crisis, especially with the escalation of propaganda media campaigns between the four boycotting countries on the one hand and Qatar on the other hand, in light of crises and conflicts in the Gulf region and the Arab region in general. The researcher used the survey method to answer the research questions and achieve its results. This res
... Show MoreIn the current endeavor, a new Schiff base of 14,15,34,35-tetrahydro-11H,31H-4,8-diaza-1,3(3,4)-ditriazola-2,6(1,4)-dibenzenacyclooctaphane-4,7-dien-15,35-dithione was synthesized. The new symmetrical Schiff base (Q) was employed as a ligand to produce new complexes comprising Co(II), Ni(II), Cu(II), Pd(II), and Pt(II) metal-ions at a ratio of 2:1 (Metal:ligand). There have been new ligands and their complexes validated by (FTIR), (UV-visible), 1H-NMR, 13C-NMR, CHNS, and FAA spectroscopy, Thermogravimetric analysis (TG), Molar conductivity, and Magnetic susceptibility. The photostabilization technique to enhance the polymer was also used. The ligand Q and its complexes were mixed in 0.5% w/w of polyvinyl chloride in tetrahydrofuran
... Show MoreTwo locally isolated microalgae (Chlorella vulgaris Bejerinck and Nitzschia palea (Kützing) W. Smith) were used in the current study to test their ability to production biodiesel through stimulated in different nitrogen concentration treatments (0, 2, 4, 8 gl ), and effect of nitrogen concentration on the quantity of primary product (carbohydrate, protein ), also the quantity and quality of lipid. The results revealed that starvation of nitrogen led to high lipid yielding, in C. vulgaris and N. palea the lipid content increased from 6.6% to 40% and 40% to 60% of dry weight (DW) respectively.Also in C. vulgaris, the highest carbohydrate was 23% of DW from zero nitrate medium and the highest protein was 50% of DW in the treatment 8gl. Whil
... Show Morethis paper presents a novel method for solving nonlinear optimal conrol problems of regular type via its equivalent two points boundary value problems using the non-classical
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More