Abdul Adhem A. Ali

Learn More
— A System state in HTTP botnet uses HTTP protocol for the creation of chain of Botnets thereby compromising other systems. By using HTTP protocol and port number 80, attacks can not only be hidden but also pass through the firewall without being detected. The DPR based detection leads to better analysis of botnet attacks [3]. However, it provides only(More)
Objectives The general aim of this study was to evaluate general practitioners' perceptions, knowledge and experiences regarding medicines' cost and subsidy in New Zealand. Methods A quantitative cross-sectional study, with postal questionnaires , was conducted to survey 700 New Zealand general practitioners (GPs) registered with the Medical Council of New(More)
In the wireless sensor networks the energy of the nodes present in the network is limited. Due to the low manufacturing costs of sensor nodes, they can be organized in large numbers and containing more challenges in routing, topology and data management protocols. These challenges are complicated by severe energy constraints and the inherently unreliable(More)
In order to utilize high sulfur (3-6%) coals in various industries which otherwise cannot be utilized directly or even as a blend, studies on pyrolysis of four high sulfur NE regions Indian coals viz. 60ft Tikak, 20ft Tikak, Surupi and Bapung coal from Makum Coalfields of Meghalaya in presence of hydrogen were carried out at 900 0 C. The steam was generated(More)
  • 1