Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicious attacks. In this manuscript, a correspondence model is designed to discuss the algorithm in the environment of wireless communication systems and distributed computing by adopting the protocol data enhancement to the network using structured construction and diversity algorithm to improve the effectiveness of the intrusion detection system. Next, a multi-label convolutional neural network model is used to detect business transactions. An CNN was trained on the WSN-DS dataset using 5-Fold in CV technique with three hidden layers. The highest Precision values 0.951 of Grayhole attack for multi-classification.
Abstract
Characterized by the Ordinary Least Squares (OLS) on Maximum Likelihood for the greatest possible way that the exact moments are known , which means that it can be found, while the other method they are unknown, but approximations to their biases correct to 0(n-1) can be obtained by standard methods. In our research expressions for approximations to the biases of the ML estimators (the regression coefficients and scale parameter) for linear (type 1) Extreme Value Regression Model for Largest Values are presented by using the advanced approach depends on finding the first derivative, second and third.
The study consisted in the development and use of a practical method to detect and
monitor, analyze and produce maps of changes in land use and land cover in the district of
Mahmudiya in Baghdad during the period 1990-2007 using the applications of remote sensing
techniques and with the assisstant of geographic information systems (GIS),as a valuable
contribution to land degradation studies.
This study is based maiuly on the processing on two subsets of landsat5 TM images picked up
in August 1990 and 2007 respectively in order to facilitate comparision and were thengeometrically and radiometrcally calibrated ,to used for digital classification purposes using
maximum liklihoods classification or six spectral bands of
Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show MoreIn this paper we present a method to analyze five types with fifteen wavelet families for eighteen different EMG signals. A comparison study is also given to show performance of various families after modifying the results with back propagation Neural Network. This is actually will help the researchers with the first step of EMG analysis. Huge sets of results (more than 100 sets) are proposed and then classified to be discussed and reach the final.
In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show MoreGroundwater quality investigation has been carried out in the western part of Iraq (west longitude '40°40). The physicochemical analyses of 64 groundwater samples collected from seven aquifers were used in the determination of groundwater characterization and assessment. The concept of spatial hydrochemical bi-model was prepared for quantitative and qualitative interpretation. Hydrogeochemical data referred that the groundwater is of meteoric origin and has processes responsible for observed brackishness. The geochemical facies of the groundwater reveal that none of the anions and cations pairs exceed 50% and there are practically mixtures of multi-water types (such as Ca–Mg–Cl–HCO3 and Na+K–SO4–Cl water type) as do
... Show MoreGas hydrate formation is considered one of the major problems facing the oil and gas industry as it poses a significant threat to the production, transportation and processing of natural gas. These solid structures can nucleate and agglomerate gradually so that a large cluster of hydrate is formed, which can clog flow lines, chokes, valves, and other production facilities. Thus, an accurate predictive model is necessary for designing natural gas production systems at safe operating conditions and mitigating the issues induced by the formation of hydrates. In this context, a thermodynamic model for gas hydrate equilibrium conditions and cage occupancies of N2 + CH4 and N2 + CO4 gas mix
The undetected error probability is an important measure to assess the communication reliability provided by any error coding scheme. Two error coding schemes namely, Joint crosstalk avoidance and Triple Error Correction (JTEC) and JTEC with Simultaneous Quadruple Error Detection (JTEC-SQED), provide both crosstalk reduction and multi-bit error correction/detection features. The available undetected error probability model yields an upper bound value which does not give accurate estimation on the reliability provided. This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding
... Show More