Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThis research aims to solve the problem of selection using clustering algorithm, in this research optimal portfolio is formation using the single index model, and the real data are consisting from the stocks Iraqi Stock Exchange in the period 1/1/2007 to 31/12/2019. because the data series have missing values ,we used the two-stage missing value compensation method, the knowledge gap was inability the portfolio models to reduce The estimation error , inaccuracy of the cut-off rate and the Treynor ratio combine stocks into the portfolio that caused to decline in their performance, all these problems required employing clustering technic to data mining and regrouping it within clusters with similar characteristics to outperform the portfolio
... Show MoreCredit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe increase globally fossil fuel consumption as it represents the main source of energy around the world, and the sources of heavy oil more than light, different techniques were used to reduce the viscosity and increase mobility of heavy crude oil. this study focusing on the experimental tests and modeling with Back Feed Forward Artificial Neural Network (BFF-ANN) of the dilution technique to reduce a heavy oil viscosity that was collected from the south- Iraq oil fields using organic solvents, organic diluents with different weight percentage (5, 10 and 20 wt.% ) of (n-heptane, toluene, and a mixture of different ratio
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe study of the dynamic behavior of packed distillation column was studied by frequency response analysis using Matlab program. A packed distillation column (80 mm diameter) (2000 mm height) filled with glass packing (Raschig Rings 10mm), packing height (1500 mm) has been modified for separation of methanol-water mixture (60 vol%). The column dynamic behavior was studied experimentally under different step changes in, feed rate (±30%), reflux rate (±22%), and reboiler heat duty (±150%), the top and bottom concentration of methanol were measured. A frequency response analysis for the above step response was carried out using Bode diagram, the log modulus and the phase angle were used to analyze the process model. A Matlab progra
... Show MoreThis paper experimentally investigated the dynamic buckling behavior of AISI 303 stainless steel aluminized and as received intermediate columns. Twenty seven specimens without aluminizing (type 1) and 75 specimens with hot-dip aluminizing at different aluminizing conditions of dipping temperature and dipping time (type 2), were tested under dynamic compression loading (compression and torsion), dynamic bending loading (bending and torsion), and under dynamic combined loading (compression, bending, and torsion) by using a rotating buckling test machine. The experimental results werecompared with tangent modulus theory, reduced modulus theory, and Perry Robertson interaction formula. Reduced modulus was formulated to circular cross-
... Show MoreIn this work, studying the effect of ethylenediamine as a corrosion inhibitor was investigated for carbon steel in aerated HCl solution in range of 0.1-1N under dynamic conditions, i.e., rotational velocity of 400–1200 rpm in the temperature range 35 – 65 ºC. Weight loss method was employed in absence and presence of the inhibitor as an adsorption type in concentration range 1000 – 5000 ppm using rotating cylinder specimens. The experimental results showed that corrosion rate in absence and presence of inhibitor is increased with increasing temperature, rotational velocity and concentration of acid. It is decreased with increasing inhibitor concentration for the whole range of temperature, rotational velocity and concentrati
... Show MoreWith the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw
... Show More