Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15 database by dividing the record's attributes into four groups, including State, Protocol, Service, and the rest of the features is Digits. Four DNA characters were used to represent each protocol attribute values. While two DNA characters are used to represent State, Service and Digits attributes values. Then, the clustering method is applied to classify the records into two clusters, either attack or normal. The current experiment results showed that the proposed system has achieved a good detection rate and accuracy results equal to 81.22% and 82.05% respectively. Also, the system achieved fast encoding and clustering time that equal 0.385 seconds and 0.00325 seconds respectively for each record.
It has become necessary to change from a traditional system to an automated system in production processes, because it has high advantages. The most important of them is improving and increasing production. But there is still a need to improve and develop the work of these systems.
The objective of this work is to study time reduction by combining multiple sequences of operations into one process. To carry out this work, the pneumatic system is designed to decrease\ increase the time of the sequence that performs a pick and place process through optimizing the sequences based on the obstacle dimensions. Three axes are represented using pneumatic cylinders that move according to the sequence used. The system is implemented and con
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreQ-switched lasers widely used in management skin diseases and
sometimes its effect may be inadequate or associated with
cytotoxicity. The current study aimed to investigate the effect of
Q-switched Nd:YAG laser upon cellular elements using in vitro
experimental model. Aqueous solutions of human albumin and pure
calf thymus double strand deoxyribonucleic acid (ctdsDNA)
irradiated with Q-switched Nd:YAG laser at different rates (1, 3 Hz)
and time exposure (up to 60 seconds) using 532 nm (400 mJ) and
1064 (1200 mJ) nm wavelength with fixed spot size of 4 mm. The
effect of laser irradiation on the albumin solution also studied in the
presence of elemental salts of copper, zinc and iron.
Q-switched laser irrad
Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreThe porosity of materials is important in many applications, products and processes, such as electrochemical devices (electrodes, separator, active components in batteries), porous thin film, ceramics, soils, construction materials, ..etc. This can be characterized in many different methods, and the most important methods for industrial purposes are the N2 gas adsorption and mercury porosimetry. In the present paper, both of these techniques have been used to characterize some of Iraqi natural raw materials deposits. These are Glass Sand, Standard Sand, Flint Clay and Bentonite. Data from both analyses on the different types of natural raw materials deposits are critically examined and discussed. The results of specific surface are
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreIn present study 74 specimens of urine were collected from patients suffering from urinary tract infections.Fifty (67.56%) isolates were identified as Escherichia coli. 78% of isolates were identified as extendedspectrum beta lactamases (ESBL) producer. Antibiotic susceptibility t est was done and ceftazidime wasselected to complete this study by implying stress at sub-MIC on isolate harbor high number of resistancegenes (N11) and compared with sensitive isolate (S). Only four β-lactamase coding genes were detected;blaTEM, blaPER, blaVIM and blaCTX-M-2 and N11 had blaTEM, blaPER, and blaVIM. It was found that the resistantisolate did not form biofilm when compared with the sensitive one, which formed moderate biofilm. Inaddition, ceftazidi
... Show MoreThis paper proposes an on-line adaptive digital Proportional Integral Derivative (PID) control algorithm based on Field Programmable Gate Array (FPGA) for Proton Exchange Membrane Fuel Cell (PEMFC) Model. This research aims to design and implement Neural Network like a digital PID using FPGA in order to generate the best value of the hydrogen partial pressure action (PH2) to control the stack terminal output voltage of the (PEMFC) model during a variable load current applied. The on-line Particle Swarm Optimization (PSO) algorithm is used for finding and tuning the optimal value of the digital PID-NN controller (kp, ki, and kd) parameters that improve the dynamic behavior of the closed-loop digital control fue
... Show MoreThis paper presents new modification of HPM to solve system of 3 rd order PDEs with initial condition, for finding suitable accurate solutions in a wider domain.