With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vectors to determine the sub-class of each attack type are selected. Features are evaluated to measure its discrimination ability among classes. K-Means clustering algorithm is then used to cluster each class into two clusters. SFFS and ANN are used in hierarchical basis to select the relevant features and classify the query behavior to proper intrusion type. Experimental evaluation on NSL-KDD, a filtered version of the original KDD99 has shown that the proposed IDS can achieve good performance in terms of intrusions detection and recognition.
At present, numerous novel chemical compounds face challenges related to their limited solubility in aqueous environments. These compounds are classified under the Biopharmaceutical Classification System (BCS) as either class II or class IV substances. Different carriers were used to increase their solubility. Candesartan cilexetil (CC) is one of the most widely used antihypertensive drugs, which belongs to class II drugs. The aim of this research was to enhance the solubility and dissolution rate of CC through a complexation approach involving β-cyclodextrin and its derivatives, specifically hydroxypropyl beta cyclodextrin (HP-β-CD), methyl beta cyclodextrin (M-β-CD), and sulfonyl ether beta-cyclodextrin (SBE-β-CD), serving as
... Show MoreThe term "nano gold," also known as "gold nanoparticles," is commonly used. These particles are extremely small, with a diameter of less than 100 nm, which is only a fraction of the width of a human hair. Due to their tiny size, nano gold particles are often found in a colloidal solution, where they are suspended in a liquid stabilizer. This colloidal gold is essentially another name for nano gold. The main method for producing gold nanoparticles in a colloidal solution is the citrate synthesis technique, which involves combining different solutions to precipitate the gold nanoparticles. In biological systems, copper complexes play a significant role at the active sites of many metalloproteins. These complexes have potential applications in
... Show MoreThis research discusses the logic of the balance of power in the field of International Relations. It focuses on the structural-systemic version of the theory because of its centrality to the realist research program within the field. The paper examines the conventional wisdom, which argues that balances of power, in a self-help system, will form regardless of the state’s motives (or intentions); It emerges as an unintended recurring consequence of the interaction of units in anarchy, which primarily seeks superior, not an equal power. This logic assumes that hegemony does not form (or fail) in a multi-state system, because its threats (actual or perceived) to the system instill fear and provoke counterbalancing behavior by other state
... Show MoreIn recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p
... Show MoreThe recent development in statistics has made statistical distributions the focus of researchers in the process of compensating for some distribution parameters with fixed values and obtaining a new distribution, in this study, the distribution of Kumaraswamy was studied from the constant distributions of the two parameters. The characteristics of the distribution were discussed through the presentation of the probability density function (p.d.f), the cumulative distribution function (c.d.f.), the ratio of r, the reliability function and the hazard function. The parameters of the Kumaraswamy distribution were estimated using MLE, ME, LSEE by using the simulation method for different sampling sizes and using preli
... Show MoreIn this paper,we focus on the investigated and studied of transition rate in metal/organic semiconductor interface due to quantum postulate and continuum transition theory. A theoretical model has been used to estimate the transition rate cross the interface through estimation many parameters such that ;transition energy ,driving electronic energy U(eV) ,Potential barrier ,electronic coupling ,semiconductor volume ,density ,metal work function ,electronic affinity and temperature T. The transition energy is critical facter of charge transfer through the interfaces of metal organic films device and itscontrol of charge injection and transport cross interface. However,the potential at interfa
... Show MoreOne of the prominent goals of Metrical Phonology Theory is providing stress of poetry on the syllable-, the foot-, and the phonological word- levels. Analysing poetry is one of the most prominent and controversial issues for the involved number and types of syllables, feet, and meters are stable in poetry compared to other literary texts. The prosodic seeds of the theory have been planted by Firth (1948) in English, while in Arabic يديهارفلا in the second half of the eighth century (A.D.) has done so. Investigating the metrical structure of poetry has been conducted in various languages, whereas scrutinising the metrical structure of English and Arabic poetry has received little attention. This study aims at capturing the
... Show MoreSeeds of five cultivars of oats (Avena sativa) were introduced from Italy in 2009. Seeds were propagated on the farm of the Dept. of Field Crops Sci. / Coll. of Agric. / Univ. of Baghdad in the season 2009 – 2010. The cultivars Anatolia, Alguda, Hamel, Pimula and Genzania were planted under 3 irrigation intervals; 3, 4 and 5 weeks to give water depth of 480, 400 and 320 mm, respectively . The depth of water was 80 mm each irrigation. A factorial experiment with RCBD of 4 replicates was conducted in 2 consecutive seasons in 2010 – 2011 and 2011 – 2012. The cultivar Alguda gave highest grain yield (8.07 t/ ha) under 480 mm, and 7.02 t / ha average of 3 water depths. This cultivar was characterized by high growth rate (13.2 g/m2/ d) that
... Show More