Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re
... Show MoreA twisted-fin array as an innovative structure for intensifying the charging response of a phase-change material (PCM) within a shell-and-tube storage system is introduced in this work. A three-dimensional model describing the thermal management with charging phase change process in PCM was developed and numerically analyzed by the enthalpy-porosity method using commercial CFD software. Efficacy of the proposed structure of fins for performing better heat communication between the active heating surface and the adjacent layers of PCM was verified via comparing with conventional longitudinal fins within the same design limitations of fin material and volume usage. Optimization of the fin geometric parameters including the pitch, numb
... Show MoreAbstract:
Recently, there is a widespread attention about the service at the level of each of the research and academic studies, and at the organizational level as well. The subject of orientation towards the service aspect is starting to be of this attention being of the modern subjects, relatively, which appeared at the end of the last century, as well as the link of this subject with the relationship between the organization and its customers, and how to provide high quality services to get their satisfaction. Thus, the specialists from researchers were interested in this field to develop an appropriate scale to measure the organizational orientation toward service, and it was the most prominen
... Show MoreThe virulent genes are the key players in the ability of the bacterium to cause disease. The products of such genes that facilitate the successful colonization and survival of the bacterium in or cause damage to the host are pathogenicity determinants. This study aimed to investigate the prevalence of virulence factors (esp, agg, gelE, CylA) in E. faecalis isolated from diverse human clinical collected in Iraqi patient , as well as to assess their ability to form biofilm and to determine their haemolytic and gelatinase activities. Thirty-two isolates of bacteria Enterococcus faecalis were obtained, including 15 isolates (46.87%) of the urine, 6 isolates (18.75%) for each of the stool and uterine secretions, and 5 isolates (15.62%) of the wo
... Show MoreGender and culture are among the factors that influence the process of understanding and interpreting different types of communication, especially images. The current study, which is a part of a master’s thesis, aims at investigating the role of gender and culture in interpreting and understanding the caricatures that deal with women’s issues in Arab societies. To this end, the researchers adopted Barthes’ (1957) concepts of denotation and connotation in his theory of mythologies in addition to Langacker’s (1987) theory of (Domains). The research concludes that the female subjects have better cognitive abilities in investing the signs within the selected caricatures. The other factor the study reached to is that the respondents
... Show MoreIt is more beneficial science and created and the highest honor is the Koran Sciences, God has honored research in this fun science, came this research that shed the light on the radical incision, and Naughty derivatives as contained in the Koran, and illustrate the diversity of Saghma morphological, and fork them from derivatives what it entailed connotations, as well as the evacuation of cryptic in some of these verses from the biological secrets take minds newly exposed Anitrjt science under the name of scientific miracles.
The research methodology is revenue verse which included the word, and revenue lexical meaning and its meaning in the context of the Qur'an, and reflect the views of the commentators of the verse, and then the r