With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vectors to determine the sub-class of each attack type are selected. Features are evaluated to measure its discrimination ability among classes. K-Means clustering algorithm is then used to cluster each class into two clusters. SFFS and ANN are used in hierarchical basis to select the relevant features and classify the query behavior to proper intrusion type. Experimental evaluation on NSL-KDD, a filtered version of the original KDD99 has shown that the proposed IDS can achieve good performance in terms of intrusions detection and recognition.
Polyaniline organic Semiconductor polymer was prepared by oxidation polymerization by adding hydrochloric acid concentration of 0.1M and potassium per sulfate concentration of 0.2M to 0.1M of aniline at room temperature, the polymer was deposited at glass substrate, the structural and optical properties were studies through UV-VIS, IR, XRD measurements, films have been operated as a sensor of vapor H2SO4 and HCl acids.
إن المقصود باختبارات حسن المطابقة هو التحقق من فرضية العدم القائمة على تطابق مشاهدات أية عينة تحت الدراسة لتوزيع احتمالي معين وترد مثل هكذا حالات في التطبيق العملي بكثرة وفي كافة المجالات وعلى الأخص بحوث علم الوراثة والبحوث الطبية والبحوث الحياتية ,عندما اقترح كلا من Shapiro والعالم Wilk عام 1965 اختبار حسن المطابقة الحدسي مع معالم القياس
(
In this work, copper substituted cobalt ferrite nanoparticles with
chemical formula Co1-xCuxFe2O4 (x=0, 0.3, and 0.7), has been
synthesized via hydrothermal preparation method. The structure of
the prepared materials was characterized by X-ray diffraction (XRD).
The (XRD) patterns showed single phase spinel ferrite structure.
Average crystallite size (D), lattice constant (a), and crystal density
(dx) have been calculated from the most intense peak (311).
Comparative standardization also performed using smaller average
particle size (D) on the XRD patterns of as-prepared ferrite samples
in order to select most convenient hydrothermal synthesis conditions
to get ferrite materials with smallest average particl
In the current research, an eco-biosynthesis method for synthesizing silver nanoparticles (AgNPs) is reported using thymus vulgaris leaves (T. vulgaris) extracts. The optical and structural properties of the nanoparticles is determined using UV-visible, x-ray diffraction (XRD) and field emission scanning electron microscope (FESEM). In addition, the synthesis factors such as the temperature, the molar ratio of silver nitride and thymus vulgaris leaves extract have been investigated. The XRD pattern presented higher intensity for the five characteristic peaks of silver. FESEM images for same samples indicated that the particle size was distributed between 24-56 nm. In addition, it’s observed the formation of some aggregated Ag particles
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreIn this work, the study of
A rapid, sensitive and without extraction spectrophotometric method for determination of clonazepam (CLO) in pure and pharmaceutical dosage forms has been described. The proposed method was simply depended on charge transfer reaction between reduced CLO (n-donor) and metol (N-methyl-p-aminophenol sulfate) as a chromogenic reagent (π- acceptor). The reduced drug, with zinc and concentrated hydrochloric acid, produced a purple colored soluble charge-transfer complex with metol in the presence of sodium metaperiodate in neutral medium, which has been measured at λmax 532 nm. All the variables which affected the developed and the stability of the colored product such as concentration of reagent and oxidant, temperature and time of rea
... Show MoreThe term "tight reservoir" is commonly used to refer to reservoirs with low permeability. Tight oil reservoirs have caused worry owing to its considerable influence upon oil output throughout the petroleum sector. As a result of its low permeability, producing from tight reservoirs presents numerous challenges. Because of their low permeability, producing from tight reservoirs is faced with a variety of difficulties. The research aim is to performing hydraulic fracturing treatment in single vertical well in order to study the possibility of fracking in the Saady reservoir. Iraq's Halfaya oil field's Saady B reservoir is the most important tight reservoir. The diagnostic fracture injection test is determined for HF55using GOHFER soft
... Show More