With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vectors to determine the sub-class of each attack type are selected. Features are evaluated to measure its discrimination ability among classes. K-Means clustering algorithm is then used to cluster each class into two clusters. SFFS and ANN are used in hierarchical basis to select the relevant features and classify the query behavior to proper intrusion type. Experimental evaluation on NSL-KDD, a filtered version of the original KDD99 has shown that the proposed IDS can achieve good performance in terms of intrusions detection and recognition.
<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe
... Show MoreThe optical modulator was designed by using iterated function
systems (IFSs) by IFS Construction Kit program. The modulator was inserted into the optical system using ZEMAX optical design program. In this program, it is assumed that the modulator is made from one of آ the infrared transmitting materials. Eight materials at room temperature were used in this study; these are IRTRAN materials, Si, and Ge for the range of 3-9 l-lm.
Systems were evaluated and analyzed by using different criteria,
including spot diagram, modulation transfer function, and point spread function. The effect of optical modulator change with the chang of آ its material results in focusing of functions and frequencies as requ
... Show MorePerimenopausal bleeding, is a very common problem, which is an alarming symptom for both; women and their doctors because of the rising fears of cellular changes or tumor of endometrium. In our study we tried to prove that collecting endometrial samples using the outpatient method of Pipelle is as effective as collecting the endometrial samples in the traditional method of Dilation and Curettage (DandC) in operation theatre which necessitates general anesthesia. Ninety four patients more than 40 years old were included in the study, all of them were complaining of abnormal uterine bleeding (pregnant ladies and ladies using hormonal contraception were excluded from the study) and endometrial samples were collected first in outpatient
... Show MoreGlobalization as phenomena has affected all aspects of life and reflected its impacts to the Arab world politically, economically, and culturally and became a vital field that related directly to our life. This field of searching needs as many studies and Academics as for employing the means that needed to face a national challenge which targeting the Arabic man Character in its ethics and values. This very important thing needs a very important reaction to face that challenge to protect the cultural ARABIC & ISLAMIC characteristics and to take care of education in all its levels and forms as it is an invincible fort. For that, this field has become as the priority of the studying and researches if the
... Show MoreEthanol as a solvent, a precursor of titanium isopropoxide and a stabilizer of either hydrochloric acid or ammonium hydroxide was used to prepare a titanium dioxide aqueous solution. The aqueous solutions with different values of pH and the morphology of the resultant reaction of the nanoparticles of titanium dioxide were investigated. The X-ray diffraction showed that at low temperatures and with acidic solutions, rutile structures are more favorable to grow on titanium dioxide synthesized, while at low and average temperatures and with base solutions, anatase phase is more pronounced. The crystalline form and the re-confirmation of the crystallite size growth were observed by the scanning electron microscopy. The atomic force micr
... Show MoreIn this study, we design narrow band pass filter for window (3_5) ?m dependent on the needle optimization method , and a comparison with global designs published -Also, the effect of change parameter design on the optical performance of filter was studded and being able to overcome the difficulties of the design.In this study, the adoption of homogeneous optical properties materials as thin film depositing on a substrate of germanium at wavelength design (? = 4 ?m). For design this kind of filters we used advanced computer program (Matlab )to build a model design dependent both matrix characteristic and Needle technique. In this paper we refer to the type of Mert function , which is used for correct optical performance acces
... Show MoreComputational study of three-dimensional laminar and turbulent flows around electronic chip (heat source) located on a printed circuit board are presented. Computational field involves the solution of elliptic partial differential equations for conservation of mass, momentum, energy, turbulent energy, and its dissipation rate in finite volume form. The k-ε turbulent model was used with the wall function concept near the walls to treat of turbulence effects. The SIMPLE algorithm was selected in this work. The chip is cooled by an external flow of air. The goals of this investigation are to investigate the heat transfer phenomena of electronic chip located in enclosure and how we arrive to optimum level for cooling of this chip. These par
... Show MorePluripotent stem cells (PSC) possess unlimited proliferation, self-renewal, and a differentiation capacity spanning all germ layers. Appropriate culture conditions are important for the maintenance of self-renewal, pluripotency, proliferation, differentiation, and epigenetic states. Oxygen concentrations vary across different human tissues depending on precise cell location and proximity to vascularisation. The bulk of PSC culture-based research is performed in a physiologically hyperoxic, air oxygen (21% O2) environment, with numerous reports now detailing the impact of a physiologic normoxia (physoxia), low oxygen culture in the maintenance of stemness, survival, morphology, proliferation, differentiation potential, and epigenetic
... Show MoreThis research studies Reinforcing and applied load of Wear Rate for Epoxy composites contains from epoxy resin (Ep) as a matrix material and reinforced by Gawain red wood flour , Russian white wood flour , glass powder and rock wool fibers , with volume fraction (20%) for all samples in lab conditions. by using the load (10,20 ,30 ,40) Newton of iron disc for testing time(10) minute, and the results have shown that the reinforcing of epoxy resin led to decrease wear rate for all samples except the hybrid composites reinforced earth glass powder , that the wear rate values decrease from (22×10-9g/cm) to (4×10-9g/cm) of composite material(Ep+R.W.F) and thus(Ep+W.W.F) at la
... Show More