Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
The study using Nonparametric methods for roubust to estimate a location and scatter it is depending minimum covariance determinant of multivariate regression model , due to the presence of outliear values and increase the sample size and presence of more than after the model regression multivariate therefore be difficult to find a median location .
It has been the use of genetic algorithm Fast – MCD – Nested Extension and compared with neural Network Back Propagation of multilayer in terms of accuracy of the results and speed in finding median location ,while the best sample to be determined by relying on less distance (Mahalanobis distance)has the stu
... Show MoreThe Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie
... Show MoreTransmission lines are generally subjected to faults, so it is advantageous to determine these faults as quickly as possible. This study uses an Artificial Neural Network technique to locate a fault as soon as it happens on the Doukan-Erbil of 132kv double Transmission lines network. CYME 7.1-Programming/Simulink utilized simulation to model the suggested network. A multilayer perceptron feed-forward artificial neural network with a back propagation learning algorithm is used for the intelligence locator's training, testing, assessment, and validation. Voltages and currents were applied as inputs during the neural network's training. The pre-fault and post-fault values determined the scaled values. The neural network's p
... Show MoreWellbore instability is one of the major issues observed throughout the drilling operation. Various wellbore instability issues may occur during drilling operations, including tight holes, borehole collapse, stuck pipe, and shale caving. Rock failure criteria are important in geomechanical analysis since they predict shear and tensile failures. A suitable failure criterion must match the rock failure, which a caliper log can detect to estimate the optimal mud weight. Lack of data makes certain wells' caliper logs unavailable. This makes it difficult to validate the performance of each failure criterion. This paper proposes an approach for predicting the breakout zones in the Nasiriyah oil field using an artificial neural network. It
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreWars represent one of the most serious threats to the world order; It is considered a violation of international laws and norms, and humanitarian principles. From this point comes the study of the importance of the topic entitled (The Future of the Russian-Ukrainian war and the extent of its Reflection on the security of Eastern European countries after the year 2022). This study is based on reviewing future possibilities (scenarios) of war. The Russian-Ukrainian war, which was launched by the Russian government led by Russian President Vladimir Putin in February 2022, is still ongoing at the time of writing this research. This chapter includes three possibilities (scenarios). The first possibility deals with the development of the war t
... Show MoreDesigning cloth is a part from culture and civilization of the area of every state to prove its being in all times because it is grown with Man to establish both goals: usefulness and beauty.It is necessary that designer puts in his mind the importance of the designing sources that he derives his designs from , because those sources are also important in that time especially :The Iraqi Ancient Civilization , the Islamic Civilization and Iraqi Folklores . Not to use the cloth sources that doesn't have well known roots in addition to lacking of elements and bases of balance in its different aspects. In conclusion to that studying research subject comes. (Balance Role in designing cloth curtains) The idea or the problem of the research is t
... Show Moreاسباب تفرد استخدام خط النسخ في تصميم الحروف الطباعية
Analysis of Covariance consider to be quite important procedure to reduce the effect of some independents factors before going through the experiment.
By this procedure we can compare variances causes from the difference between treatments and error term variance of they are equals or less than consider to be not significant, otherwise if is significant.
We carry on with this comparison until we find the greatest covser for the significant variance flam the treatments.
There are methods can be used like least significant difference method, Duncan method and Turkeys' w-procedure and Student Newman.
Key Word: Analysis of variatio
... Show MoreDesigning and Standardizing two tests for motor coordination timing for youth basketball players Research submitted by Prof. Faris sami & asst. prof. Wasan hanoon ali & asst. prof. Feras muttasher Baghdad University-College Of Physical Education and Sport Sciences Motor coordination in basketball is considered one of the most important factors for success in skill performance accuracy and speed due to the defensive and offensive situations of the game. The problem of the research lies in the lack of tests that can specify the growth of motor coordination through which the relative change for a number of players can be noticed due to practice and training. The subjects of the research were (30) young league players of National Center for gif
... Show More