Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Any design subject to a set of forces contributing to the establishment of relations working to strengthen the internal elements of the design; any imbalance in these elements can make a fragmented and weak design, thus preventing it from achieving the goal or performance. Poor performance can be attributed to various factors: the extent and function of the elements and principles in the design, realization of the idea, especially in fashion design.
Moreover, there are many aspects of a design that go into achieving the realization of the designer’s idea. The design utilizes a lot of stimulants by drawing attention to its design, which is consistent with the need for psychological and material individuals. In this research, we will
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreWe can understand interior design as a series of interconnected human principles and goals formed by science and knowledge to build a human product that reveals or gives meaning to things، and this can be presented through ecology as a system concerned with environmental aspects and as part of interior design، seeking to achieve aesthetic and functional values، in an interactive form between spaces The interior and its occupants are within an environmental balance full of life، and the ecological interior design attaches great importance to the embodiment of spiritual aspects in the internal environment، in addition to emphasizing the importance of protecting the environment and preserving resources through saving in its use and usi
... Show MoreSince his first existence on earth, human had formed a connecting link for a regressive, kinetic and developed relationship that comes from a semi-complicated interaction between natural environment and constructed environment, and this resulted in the survival of human and his existence continuance. Constructed environment enabled human to survive the natural environment inconstancies and enemies as predators, also it helped him to feel safe, comfortable and to practice his everyday life activities...etc. This alternative interaction resulted in creating a civilized legacy for a group of landmarks that tell about the development of this relationship by elemental output that reached us either by documents and manuscripts or as an existed
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreThis paper presents a new design of a nonlinear multi-input multi-output PID neural controller of the active brake steering force and the active front steering angle for a 2-DOF vehicle model based on modified Elman recurrent neural. The goal of this work is to achieve the stability and to improve the vehicle dynamic’s performance through achieving the desired yaw rate and reducing the lateral velocity of the vehicle in a minimum time period for preventing the vehicle from slipping out the road curvature by using two active control actions: the front steering angle and the brake steering force. Bacterial forging optimization algorithm is used to adjust the parameters weights of the proposed controller. Simulation resul
... Show MoreUse of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic
... Show MoreAfter the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings
... Show Moresubstitution is considered a method of meaning enrichment and is a formal substitution for the letter or the word inside the text, and it is an expression substitution that is a replacement of an element of a text with a formal or graphic element, and a substitution of a latter form by a previous vocalization, thus it results in a cohesive expression. Replacement inside the text happens through the existing relation between the word or the letter and the form within the phenomenon that is based on enhancing the meaning in a way that delimits the context. There are many studies and researches written about replacement, especially in the textual linguistics that focused on the literary and linguistic texts. Hence, the researcher found that
... Show More