Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreRecent years have witnessed an increase in the use of composite coatings for numerous applications, including aerospace, aircraft, and maritime vessels. These materials owe this popularity surge to the superior strength, weight, stiffness, and electrical insulation they exhibit over conventional substances, such as metals. The growing demand for such materials is accompanied by the inevitable need for fast, accurate, and affordable nondestructive testing techniques to reveal any possible defects within the coatings or any defects under coating. However, typical nondestructive testing (NDT) techniques such as ultrasonic testing (UT), infrared thermography (IRT), eddy current testing (ECT), and laser shearography (LS) have failed to p
... Show MoreThe mechanical properties and microstructure of hot-rolled steel are critical in determining its performance in industrial applications, particularly when exposed to elevated temperatures. This study examines the effects of varying temperatures and soaking times on these properties through a series of controlled experiments. The primary objective was to optimize the key response parameters, including tensile strength, yield strength, and elongation, by analyzing the influence of temperature and time. A full factorial design approach was used, applying the desirability function theory to explore all possible combinations and identify optimal processing conditions. The experimental results showed that the soaking time played a critica
... Show MoreEriobotrya japonica Lindl., named as loquat, is a subtropical fruit tree of the family Rosaceae which is well known medical plant originated in Japan and China. Loquat portions, like leaves, peels and fruits have been shown to possess various health usefulnesses. In Chinese classical medicine, it is vastly utilized in many illnesses, like gastroenteric disorders, diabetes mellitus, pulmonary inflammatory diseases and chronic bronchitis. Loquat plant contain many active constituents, such as flavonoids, carotenoids, vitamins, polyphenolic compounds, other that have many biological effects like anti-tumor, anti-diabetic, anti-inflammatory, anti-mutagenic, antioxidant, antiviral, antitussive, hepatoprotective and hypoli
... Show MoreThe Back-Propagation (BP) is the best known and widely used learning algorithm in training multiple neural network. A vast variety of improvements to BP algorithm have been proposed since ninety’s. in this paper, the effects of changing the number of hidden neurons and activation equation are investigated. According to the simulation results, the convergence speed have been improved and become much faster by the previous two modifications on the BP algorithm.
The aim of this paper is to examine cases of deletion not dependent on linguistic context. Perlmutter (1971) claims that any sentence other than an imperative1 in which there is an S that does not contain a subject in the surface structure is ungrammatical. Dillon (1978) counts elliptical sentences such as ^ Beg your pardon2 as grammatically incomplete (and hence as strictly ungrammatical). Such statements are, however, not without problems for reasons that will be given below.
In this paper we introduce generalized (α, β) derivation on Semirings and extend some results of Oznur Golbasi on prime Semiring. Also, we present some results of commutativity of prime Semiring with these derivation.
The study aims to investigate the degree of student teachers at Sultan Qaboos University acquired skills in teaching Arabic via a virtual micro-teaching lab, as well as to reveal the difficulties they faced and their development proposals. To do this, the researchers developed a questionnaire divided into four dimensions: planning, implementation, evaluation, and
ethical values for the teaching profession, in addition to two open-ended questions to identify difficulties and suggestions. It was administered to (30) student teachers. The results revealed that the average degree of student-teacher acquisition of skills was high in its four dimensions. It ranged between (39.2) to (82.2), while the overall average was (56.2).
... Show More