RA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreNowadays, people's expression on the Internet is no longer limited to text, especially with the rise of the short video boom, leading to the emergence of a large number of modal data such as text, pictures, audio, and video. Compared to single mode data ,the multi-modal data always contains massive information. The mining process of multi-modal information can help computers to better understand human emotional characteristics. However, because the multi-modal data show obvious dynamic time series features, it is necessary to solve the dynamic correlation problem within a single mode and between different modes in the same application scene during the fusion process. To solve this problem, in this paper, a feature extraction framework of
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreAn environmentally friendly technique was used to prepare titanium dioxide@ silver (core shell) (TiO₂@Ag NPs) using chard leaf extract, a natural stabilizer and reductant. A nanocomposite (NCs) of TiO₂@Ag supported by halloysite nanotubes (HNTs), TiO2@Ag/HNT NCs, was prepared under microwave irradiation. The microwave technique is used to accelerate the reaction and enhance the homogeneity of nanoparticle distribution. Spectroscopic and structural analyses were performed on the resulting nanocomposite. X-ray diffraction (XRD) revealed a clear crystalline structure with grain sizes ranging from 7 to 15 nm, with an average of ~11 nm, the transmission electron microscope (TEM) revealed that the size of nanoparticles in the TiO₂@Ag/HNT N
... Show More