Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicious attacks. In this manuscript, a correspondence model is designed to discuss the algorithm in the environment of wireless communication systems and distributed computing by adopting the protocol data enhancement to the network using structured construction and diversity algorithm to improve the effectiveness of the intrusion detection system. Next, a multi-label convolutional neural network model is used to detect business transactions. An CNN was trained on the WSN-DS dataset using 5-Fold in CV technique with three hidden layers. The highest Precision values 0.951 of Grayhole attack for multi-classification.
The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThe Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreShadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show MoreDrought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreBackground: The vaginal microbial ecosystem stability preclude many other organisms but sometimes the vaginal micro biota is disturbed and this cause change in the normal
balance causing symptoms of vulvuvaginitis like abnormal or increased vaginal discharge, redness and itching.
Objective: To prove C. albicans presence in their vagina clinically and laboratory by culture of vaginal swab on two media.
Type of the study: This study is a case control study
Methods: This study is a case control study in which 100 clinically patient women admitted to maternity hospital in kalar city and khanaqin hospital during the pe
... Show MoreWhen industrial and constructional renaissance started in the world, the great interest was going on towards the equipment’s, which was the first mean for production. After industry was settled the interest was going on towards the men ship which manpower on which the production depends. It was approved that it represents the basic part in all of the processes and the protection of those individuals against dangers of these equipment’s, industry and its accidents was the basic things which was studied in many researches until it crystallized in general principles for all industries and other take care in each industry.
The professional safety is concerned as restrict which
... Show MoreCountries are developing the spatial development of their societies through the projects that they undertake in various ways, and this development may be cause great impact on the environment, which also depend on the type of development, whether industrial, agricultural, or service and after the problems that occurred as a result of development on the environment, most of the countries currently did to legislating laws Environmental and some other procedures before granting environmental approvals for the purpose of establishing spatial development projects. One of the most important of these laws and regulations is Environmental impact assessment (EIA). The environmental impact asse