Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15 database by dividing the record's attributes into four groups, including State, Protocol, Service, and the rest of the features is Digits. Four DNA characters were used to represent each protocol attribute values. While two DNA characters are used to represent State, Service and Digits attributes values. Then, the clustering method is applied to classify the records into two clusters, either attack or normal. The current experiment results showed that the proposed system has achieved a good detection rate and accuracy results equal to 81.22% and 82.05% respectively. Also, the system achieved fast encoding and clustering time that equal 0.385 seconds and 0.00325 seconds respectively for each record.
Use Almtafr Alcderan orange, one of the factors Hashr Alttafaria to study Alatjabh isolates elected on the basis of specifications so that was a positive response with mutagen record and system consisting of three isolates used Alcderan orange graded concentrations and under specific Trov similar conditions Alttafar Pal NTG compared
Abstract:
Under the state scenario, fiscal policy will not be able to use the oil surpluses optimally and economically and society, as long as these surpluses are not directed by public expenditure towards new productive investments and by following the path of fiscal policy after one year 2003 and until 2013 we note that it is based on the method of spending (excessive) consumption, and did not take any action towards the budget deficit planned at the beginning of the fiscal year, and the actual surplus at the end of the fiscal year, which represents the highest expenditure in the budget, Salaries and wages of workers in various government agencies with the expansion of spending on the security side.&n
... Show MoreIn this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these
... Show MoreIraqi industrial units face strong competition due to many problems including1- high production costs2- weak interest in studying the market3- lack of government support for their products4- dumping the market with imported products with specifications and a competitive price as well as adopting the traditional cost system in calculating costs that do not provide appropriate information for pricing decisions Which requires studying and analyzing these problems and dealing with them by adopting modern technologies so that they can compete, so the research aims to show the knowledge bases of technology Activity- Based Costing, with an indication of the role of technology Activity- Based Costing in rationalizing the tax In, and the
... Show More
Abstract
Rayleigh distribution is one of the important distributions used for analysis life time data, and has applications in reliability study and physical interpretations. This paper introduces four different methods to estimate the scale parameter, and also estimate reliability function; these methods are Maximum Likelihood, and Bayes and Modified Bayes, and Minimax estimator under squared error loss function, for the scale and reliability function of the generalized Rayleigh distribution are obtained. The comparison is done through simulation procedure, t
... Show MoreThe search aims to clarify pollution to negative effects on environment and to an increasing in the dangerous polluted materials that discharged out these factories. To make active procedures in order to limit the environmental pollution.
The search problem came from an assumption which has the researched factory is suffering from the lack of applying the international specification ( ISO 14004 ). The research problem assimilated by these questions:
- What is the level or organization in thinking of environmental system according to ISO 14004 .
- What are the requirements used in researched factor
In recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS. This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP
... Show More