Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicious attacks. In this manuscript, a correspondence model is designed to discuss the algorithm in the environment of wireless communication systems and distributed computing by adopting the protocol data enhancement to the network using structured construction and diversity algorithm to improve the effectiveness of the intrusion detection system. Next, a multi-label convolutional neural network model is used to detect business transactions. An CNN was trained on the WSN-DS dataset using 5-Fold in CV technique with three hidden layers. The highest Precision values 0.951 of Grayhole attack for multi-classification.
Abstract Background: Multidrug-resistant bacteria (MDR) often contaminate hospital environment and cause serious illnesses. Quorum Sensing (QS) regulates a variety of downstream cellular processes, including antibiotics resistance mechanisms and biofilm formation, and causes harm to the host. This study investigates antibacterial susceptibility and biofilm formation of pathogenic bacteria in hospital environment. Methods: Hundred bacterial isolates were collected from various environments in the Medical City hospital. The antimicrobial susceptibility technique was evaluated through disk diffusion method. Next, biofilms formation was detected by the microliter plate assay. Finally, PCR was used to analyze the frequency of QS system gene
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreSafety programmes are considered one of the means to protect workers from different accidents and injuries and also to protect all assets including machines equipment and various materials. In spite of world state interests in occupational safety, this subject didn't get the required attention by senior staff of management at most of our country construction factories and the application of safety programmes still limited and in active. In order to a achieve the goal of the study, scientific method has been pursued to obtain the necessary information related to this study through tours to related companies and their construction factories and review literature that deal with occupational safety subject and their programmes and cost, in a
... Show MoreThe literature in general, such as the spanish literature as british literature presence lot of literary figures giant that managed its continuing work that leaves lasting impression and clear in all fields of literary world throughout history, among these writers giants can remind great writer spanish (Miguel de Cervantes) and the great british writer (William Shakespeare), this study is about them.
We can say that there are a lot of studies , works and gossip , whether literary or non- literary show how the close relationship that bound both Cervantes and William Shakespeare, although they did not meet personally never, it was not able to critics that the sweep of the differences and similarities that was between the two, becau
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreThere are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show More